starting build "57f812b8-71a5-4ce7-84fc-c7c507f30c7f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 8.192kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 51df0d6876cd: Pulling fs layer Step #1: 38da3118a46e: Pulling fs layer Step #1: ec67c84a6d76: Pulling fs layer Step #1: 8bb7dd1116ca: Pulling fs layer Step #1: 1fb4fb3d2b01: Pulling fs layer Step #1: a7d3a0578149: Pulling fs layer Step #1: 23e3013e5b98: Pulling fs layer Step #1: 50e1ee57936a: Pulling fs layer Step #1: b46b6cdbb6f2: Pulling fs layer Step #1: c0d18e8fb1fa: Pulling fs layer Step #1: 29a663a40ba4: Pulling fs layer Step #1: d57e2535d3c0: Pulling fs layer Step #1: e530a9eecf2b: Pulling fs layer Step #1: 4f27abcdaf5d: Pulling fs layer Step #1: 81adce140048: Pulling fs layer Step #1: 1eaaa1542342: Pulling fs layer Step #1: 6becd2001539: Pulling fs layer Step #1: 1fb4fb3d2b01: Waiting Step #1: 22d4835417b0: Pulling fs layer Step #1: 601a9cbfd137: Pulling fs layer Step #1: 972df7da24e8: Pulling fs layer Step #1: 23e3013e5b98: Waiting Step #1: 535ecd0613d1: Pulling fs layer Step #1: 16949380c6e4: Pulling fs layer Step #1: da4104990ff0: Pulling fs layer Step #1: c19b7fe83e8a: Pulling fs layer Step #1: 50e1ee57936a: Waiting Step #1: 3c6277aa8e2b: Pulling fs layer Step #1: a7d3a0578149: Waiting Step #1: bcf869ca811e: Pulling fs layer Step #1: b46b6cdbb6f2: Waiting Step #1: 4a49dc7a9851: Pulling fs layer Step #1: de9ad109123c: Pulling fs layer Step #1: d57e2535d3c0: Waiting Step #1: d74dccfeea37: Pulling fs layer Step #1: c0d18e8fb1fa: Waiting Step #1: 9650ce23f886: Pulling fs layer Step #1: eaeb815cd75a: Pulling fs layer Step #1: 3ccdc7b565ee: Pulling fs layer Step #1: e530a9eecf2b: Waiting Step #1: 11c03f65d6c1: Pulling fs layer Step #1: 4f27abcdaf5d: Waiting Step #1: 29a663a40ba4: Waiting Step #1: 81adce140048: Waiting Step #1: 535ecd0613d1: Waiting Step #1: 16949380c6e4: Waiting Step #1: 1eaaa1542342: Waiting Step #1: eaeb815cd75a: Waiting Step #1: da4104990ff0: Waiting Step #1: 601a9cbfd137: Waiting Step #1: 6becd2001539: Waiting Step #1: c19b7fe83e8a: Waiting Step #1: 22d4835417b0: Waiting Step #1: 3ccdc7b565ee: Waiting Step #1: 972df7da24e8: Waiting Step #1: de9ad109123c: Waiting Step #1: 3c6277aa8e2b: Waiting Step #1: 11c03f65d6c1: Waiting Step #1: d74dccfeea37: Waiting Step #1: bcf869ca811e: Waiting Step #1: 4a49dc7a9851: Waiting Step #1: ec67c84a6d76: Waiting Step #1: 8bb7dd1116ca: Waiting Step #1: 38da3118a46e: Verifying Checksum Step #1: 38da3118a46e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 8bb7dd1116ca: Verifying Checksum Step #1: 8bb7dd1116ca: Download complete Step #1: ec67c84a6d76: Verifying Checksum Step #1: ec67c84a6d76: Download complete Step #1: 1fb4fb3d2b01: Verifying Checksum Step #1: 1fb4fb3d2b01: Download complete Step #1: 23e3013e5b98: Verifying Checksum Step #1: 23e3013e5b98: Download complete Step #1: 51df0d6876cd: Verifying Checksum Step #1: 51df0d6876cd: Download complete Step #1: 50e1ee57936a: Verifying Checksum Step #1: 50e1ee57936a: Download complete Step #1: b549f31133a9: Pull complete Step #1: c0d18e8fb1fa: Verifying Checksum Step #1: c0d18e8fb1fa: Download complete Step #1: 29a663a40ba4: Verifying Checksum Step #1: 29a663a40ba4: Download complete Step #1: d57e2535d3c0: Verifying Checksum Step #1: d57e2535d3c0: Download complete Step #1: e530a9eecf2b: Verifying Checksum Step #1: e530a9eecf2b: Download complete Step #1: 4f27abcdaf5d: Verifying Checksum Step #1: 4f27abcdaf5d: Download complete Step #1: 81adce140048: Verifying Checksum Step #1: 81adce140048: Download complete Step #1: b46b6cdbb6f2: Verifying Checksum Step #1: b46b6cdbb6f2: Download complete Step #1: 6becd2001539: Verifying Checksum Step #1: 6becd2001539: Download complete Step #1: 1eaaa1542342: Verifying Checksum Step #1: 1eaaa1542342: Download complete Step #1: 22d4835417b0: Verifying Checksum Step #1: 22d4835417b0: Download complete Step #1: 601a9cbfd137: Verifying Checksum Step #1: 601a9cbfd137: Download complete Step #1: 972df7da24e8: Verifying Checksum Step #1: 972df7da24e8: Download complete Step #1: 535ecd0613d1: Verifying Checksum Step #1: 535ecd0613d1: Download complete Step #1: a7d3a0578149: Verifying Checksum Step #1: a7d3a0578149: Download complete Step #1: 16949380c6e4: Verifying Checksum Step #1: 16949380c6e4: Download complete Step #1: da4104990ff0: Download complete Step #1: c19b7fe83e8a: Verifying Checksum Step #1: c19b7fe83e8a: Download complete Step #1: 3c6277aa8e2b: Verifying Checksum Step #1: 3c6277aa8e2b: Download complete Step #1: bcf869ca811e: Verifying Checksum Step #1: bcf869ca811e: Download complete Step #1: 4a49dc7a9851: Verifying Checksum Step #1: 4a49dc7a9851: Download complete Step #1: de9ad109123c: Verifying Checksum Step #1: de9ad109123c: Download complete Step #1: d74dccfeea37: Verifying Checksum Step #1: d74dccfeea37: Download complete Step #1: 9650ce23f886: Download complete Step #1: eaeb815cd75a: Verifying Checksum Step #1: eaeb815cd75a: Download complete Step #1: 51df0d6876cd: Pull complete Step #1: 3ccdc7b565ee: Verifying Checksum Step #1: 3ccdc7b565ee: Download complete Step #1: 11c03f65d6c1: Verifying Checksum Step #1: 38da3118a46e: Pull complete Step #1: ec67c84a6d76: Pull complete Step #1: 8bb7dd1116ca: Pull complete Step #1: 1fb4fb3d2b01: Pull complete Step #1: a7d3a0578149: Pull complete Step #1: 23e3013e5b98: Pull complete Step #1: 50e1ee57936a: Pull complete Step #1: b46b6cdbb6f2: Pull complete Step #1: c0d18e8fb1fa: Pull complete Step #1: 29a663a40ba4: Pull complete Step #1: d57e2535d3c0: Pull complete Step #1: e530a9eecf2b: Pull complete Step #1: 4f27abcdaf5d: Pull complete Step #1: 81adce140048: Pull complete Step #1: 1eaaa1542342: Pull complete Step #1: 6becd2001539: Pull complete Step #1: 22d4835417b0: Pull complete Step #1: 601a9cbfd137: Pull complete Step #1: 972df7da24e8: Pull complete Step #1: 535ecd0613d1: Pull complete Step #1: 16949380c6e4: Pull complete Step #1: da4104990ff0: Pull complete Step #1: c19b7fe83e8a: Pull complete Step #1: 3c6277aa8e2b: Pull complete Step #1: bcf869ca811e: Pull complete Step #1: 4a49dc7a9851: Pull complete Step #1: de9ad109123c: Pull complete Step #1: d74dccfeea37: Pull complete Step #1: 9650ce23f886: Pull complete Step #1: eaeb815cd75a: Pull complete Step #1: 3ccdc7b565ee: Pull complete Step #1: 11c03f65d6c1: Pull complete Step #1: Digest: sha256:718d1e1f9fed057967ab647b50af41708389951cff904f6fdaac999ad1b3973e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 01958c5bb573 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y wget make unzip git Step #1: ---> Running in bf7e0618552a Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (236 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: git is already the newest version (1:2.25.1-1ubuntu3.13). Step #1: unzip is already the newest version (6.0-25ubuntu1.2). Step #1: unzip set to manually installed. Step #1: wget is already the newest version (1.20.3-1ubuntu2.1). Step #1: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #1: Removing intermediate container bf7e0618552a Step #1: ---> 96b75b12d4f4 Step #1: Step 3/5 : RUN git clone --depth=1 https://github.com/IUPAC-InChI/InChI inchi Step #1: ---> Running in 85bd34fcee00 Step #1: Cloning into 'inchi'... Step #1: Removing intermediate container 85bd34fcee00 Step #1: ---> 6b63c5da0449 Step #1: Step 4/5 : WORKDIR inchi Step #1: ---> Running in 129ec009ee33 Step #1: Removing intermediate container 129ec009ee33 Step #1: ---> 52b24147806c Step #1: Step 5/5 : COPY build.sh *_fuzzer.c $SRC/ Step #1: ---> 13c4b220d7c0 Step #1: Successfully built 13c4b220d7c0 Step #1: Successfully tagged gcr.io/oss-fuzz/inchi:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/inchi Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file5QbKrN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/inchi/.git Step #2 - "srcmap": + GIT_DIR=/src/inchi Step #2 - "srcmap": + cd /src/inchi Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/IUPAC-InChI/InChI Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=83094699e969fb1fed0366e2547e6fdf3a76330a Step #2 - "srcmap": + jq_inplace /tmp/file5QbKrN '."/src/inchi" = { type: "git", url: "https://github.com/IUPAC-InChI/InChI", rev: "83094699e969fb1fed0366e2547e6fdf3a76330a" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileQk74Ob Step #2 - "srcmap": + cat /tmp/file5QbKrN Step #2 - "srcmap": + jq '."/src/inchi" = { type: "git", url: "https://github.com/IUPAC-InChI/InChI", rev: "83094699e969fb1fed0366e2547e6fdf3a76330a" }' Step #2 - "srcmap": + mv /tmp/fileQk74Ob /tmp/file5QbKrN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file5QbKrN Step #2 - "srcmap": + rm /tmp/file5QbKrN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/inchi": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/IUPAC-InChI/InChI", Step #2 - "srcmap": "rev": "83094699e969fb1fed0366e2547e6fdf3a76330a" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd INCHI-1-SRC Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -Wno-everything -DTARGET_API_LIB -DCOMPILE_ANSI_ONLY -ansi -c INCHI_BASE/src/bcf_s.c INCHI_BASE/src/ichi_bns.c INCHI_BASE/src/ichi_io.c INCHI_BASE/src/ichican2.c INCHI_BASE/src/ichicano.c INCHI_BASE/src/ichicans.c INCHI_BASE/src/ichierr.c INCHI_BASE/src/ichiisot.c INCHI_BASE/src/ichimak2.c INCHI_BASE/src/ichimake.c INCHI_BASE/src/ichimap1.c INCHI_BASE/src/ichimap2.c INCHI_BASE/src/ichimap4.c INCHI_BASE/src/ichinorm.c INCHI_BASE/src/ichiparm.c INCHI_BASE/src/ichiprt1.c INCHI_BASE/src/ichiprt2.c INCHI_BASE/src/ichiprt3.c INCHI_BASE/src/ichiqueu.c INCHI_BASE/src/ichiread.c INCHI_BASE/src/ichiring.c INCHI_BASE/src/ichirvr1.c INCHI_BASE/src/ichirvr2.c INCHI_BASE/src/ichirvr3.c INCHI_BASE/src/ichirvr4.c INCHI_BASE/src/ichirvr5.c INCHI_BASE/src/ichirvr6.c INCHI_BASE/src/ichirvr7.c INCHI_BASE/src/ichisort.c INCHI_BASE/src/ichister.c INCHI_BASE/src/ichitaut.c INCHI_BASE/src/ikey_base26.c INCHI_BASE/src/ikey_dll.c INCHI_BASE/src/inchi_gui.c INCHI_BASE/src/mol2atom.c INCHI_BASE/src/mol_fmt1.c INCHI_BASE/src/mol_fmt2.c INCHI_BASE/src/mol_fmt3.c INCHI_BASE/src/mol_fmt4.c INCHI_BASE/src/readinch.c INCHI_BASE/src/runichi.c INCHI_BASE/src/runichi2.c INCHI_BASE/src/runichi3.c INCHI_BASE/src/runichi4.c INCHI_BASE/src/sha2.c INCHI_BASE/src/strutil.c INCHI_BASE/src/util.c INCHI_API/libinchi/src/ichilnct.c INCHI_API/libinchi/src/inchi_dll.c INCHI_API/libinchi/src/inchi_dll_a.c INCHI_API/libinchi/src/inchi_dll_a2.c INCHI_API/libinchi/src/inchi_dll_b.c INCHI_API/libinchi/src/inchi_dll_main.c INCHI_API/libinchi/src/ixa/ixa_builder.c INCHI_API/libinchi/src/ixa/ixa_inchikey_builder.c INCHI_API/libinchi/src/ixa/ixa_mol.c INCHI_API/libinchi/src/ixa/ixa_read_inchi.c INCHI_API/libinchi/src/ixa/ixa_read_mol.c INCHI_API/libinchi/src/ixa/ixa_status.c Step #3 - "compile-libfuzzer-coverage-x86_64": + ar rcs /work/libinchi.a bcf_s.o ichi_bns.o ichi_io.o ichican2.o ichicano.o ichicans.o ichierr.o ichiisot.o ichilnct.o ichimak2.o ichimake.o ichimap1.o ichimap2.o ichimap4.o ichinorm.o ichiparm.o ichiprt1.o ichiprt2.o ichiprt3.o ichiqueu.o ichiread.o ichiring.o ichirvr1.o ichirvr2.o ichirvr3.o ichirvr4.o ichirvr5.o ichirvr6.o ichirvr7.o ichisort.o ichister.o ichitaut.o ikey_base26.o ikey_dll.o inchi_dll.o inchi_dll_a.o inchi_dll_a2.o inchi_dll_b.o inchi_dll_main.o inchi_gui.o ixa_builder.o ixa_inchikey_builder.o ixa_mol.o ixa_read_inchi.o ixa_read_mol.o ixa_status.o mol2atom.o mol_fmt1.o mol_fmt2.o mol_fmt3.o mol_fmt4.o readinch.o runichi.o runichi2.o runichi3.o runichi4.o sha2.o strutil.o util.o Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in $SRC/*_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ basename -s .c /src/inchi_input_fuzzer.c Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_basename=inchi_input_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -I INCHI_BASE/src/ -I INCHI_API/libinchi/src/ -I INCHI_API/libinchi/src/ixa/ /src/inchi_input_fuzzer.c -c -o inchi_input_fuzzer.o Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ inchi_input_fuzzer.o -o /workspace/out/libfuzzer-coverage-x86_64/inchi_input_fuzzer -fsanitize=fuzzer /work/libinchi.a Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 51df0d6876cd: Already exists Step #4: 38da3118a46e: Already exists Step #4: 76485c50adab: Pulling fs layer Step #4: 6e454ec0415e: Pulling fs layer Step #4: fcc56198b7b3: Pulling fs layer Step #4: 839d42049c75: Pulling fs layer Step #4: 9b7f47b799be: Pulling fs layer Step #4: 885b716fb19d: Pulling fs layer Step #4: 1f82e1e2eaac: Pulling fs layer Step #4: 3582fe5817de: Pulling fs layer Step #4: a221f9a44ef5: Pulling fs layer Step #4: e9f45d43ad23: Pulling fs layer Step #4: db56863ee7be: Pulling fs layer Step #4: 84816e0f3769: Pulling fs layer Step #4: a6399624745a: Pulling fs layer Step #4: 0715e4009fac: Pulling fs layer Step #4: 4e5763569d03: Pulling fs layer Step #4: 7f4c947f7af3: Pulling fs layer Step #4: 30d1cf1bf2b4: Pulling fs layer Step #4: 839d42049c75: Waiting Step #4: 3582fe5817de: Waiting Step #4: 9b7f47b799be: Waiting Step #4: a221f9a44ef5: Waiting Step #4: 1f82e1e2eaac: Waiting Step #4: e9f45d43ad23: Waiting Step #4: db56863ee7be: Waiting Step #4: 84816e0f3769: Waiting Step #4: 885b716fb19d: Waiting Step #4: a6399624745a: Waiting Step #4: 0715e4009fac: Waiting Step #4: 4e5763569d03: Waiting Step #4: 7f4c947f7af3: Waiting Step #4: 30d1cf1bf2b4: Waiting Step #4: fcc56198b7b3: Verifying Checksum Step #4: fcc56198b7b3: Download complete Step #4: 76485c50adab: Verifying Checksum Step #4: 76485c50adab: Download complete Step #4: 6e454ec0415e: Verifying Checksum Step #4: 6e454ec0415e: Download complete Step #4: 76485c50adab: Pull complete Step #4: 9b7f47b799be: Verifying Checksum Step #4: 9b7f47b799be: Download complete Step #4: 885b716fb19d: Verifying Checksum Step #4: 885b716fb19d: Download complete Step #4: 1f82e1e2eaac: Download complete Step #4: 6e454ec0415e: Pull complete Step #4: fcc56198b7b3: Pull complete Step #4: 3582fe5817de: Verifying Checksum Step #4: 3582fe5817de: Download complete Step #4: a221f9a44ef5: Verifying Checksum Step #4: a221f9a44ef5: Download complete Step #4: db56863ee7be: Verifying Checksum Step #4: db56863ee7be: Download complete Step #4: 839d42049c75: Verifying Checksum Step #4: 839d42049c75: Download complete Step #4: 84816e0f3769: Verifying Checksum Step #4: 84816e0f3769: Download complete Step #4: a6399624745a: Verifying Checksum Step #4: a6399624745a: Download complete Step #4: 4e5763569d03: Verifying Checksum Step #4: 4e5763569d03: Download complete Step #4: 0715e4009fac: Verifying Checksum Step #4: 0715e4009fac: Download complete Step #4: 7f4c947f7af3: Download complete Step #4: e9f45d43ad23: Verifying Checksum Step #4: e9f45d43ad23: Download complete Step #4: 30d1cf1bf2b4: Verifying Checksum Step #4: 30d1cf1bf2b4: Download complete Step #4: 839d42049c75: Pull complete Step #4: 9b7f47b799be: Pull complete Step #4: 885b716fb19d: Pull complete Step #4: 1f82e1e2eaac: Pull complete Step #4: 3582fe5817de: Pull complete Step #4: a221f9a44ef5: Pull complete Step #4: e9f45d43ad23: Pull complete Step #4: db56863ee7be: Pull complete Step #4: 84816e0f3769: Pull complete Step #4: a6399624745a: Pull complete Step #4: 0715e4009fac: Pull complete Step #4: 4e5763569d03: Pull complete Step #4: 7f4c947f7af3: Pull complete Step #4: 30d1cf1bf2b4: Pull complete Step #4: Digest: sha256:cb894d78b81942499e77d79f91f562ce74c084f3ca1001f2c72a30e5404d1f69 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running inchi_input_fuzzer Step #5: Error occured while running inchi_input_fuzzer: Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4256079258 Step #5: MERGE-OUTER: 9646 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4256113825 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: 9646 total files; 0 processed earlier; will process 9646 files now Step #5: #1 pulse exec/s: 0 rss: 32Mb Step #5: #2 pulse exec/s: 0 rss: 32Mb Step #5: #4 pulse exec/s: 0 rss: 32Mb Step #5: #8 pulse exec/s: 0 rss: 32Mb Step #5: #16 pulse exec/s: 0 rss: 32Mb Step #5: #32 pulse exec/s: 0 rss: 33Mb Step #5: #64 pulse exec/s: 0 rss: 33Mb Step #5: #128 pulse exec/s: 0 rss: 33Mb Step #5: #256 pulse exec/s: 0 rss: 36Mb Step #5: #512 pulse exec/s: 256 rss: 56Mb Step #5: #1024 pulse exec/s: 113 rss: 64Mb Step #5: #2048 pulse exec/s: 97 rss: 67Mb Step #5: free(): invalid pointer Step #5: ==42== ERROR: libFuzzer: deadly signal Step #5: #0 0x55d54af2a034 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x55d54aea9088 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x55d54ae8c423 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7f0194eb141f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9a65bb469e45a1c6fbcffae5b82a2fd7a69eb479) Step #5: #4 0x7f0194cab00a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #5 0x7f0194c8a858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #6 0x7f0194cf526d (/lib/x86_64-linux-gnu/libc.so.6+0x8d26d) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #7 0x7f0194cfd2fb (/lib/x86_64-linux-gnu/libc.so.6+0x952fb) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #8 0x7f0194cfeb2b (/lib/x86_64-linux-gnu/libc.so.6+0x96b2b) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #9 0x55d54b023901 in free_t_group_info /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichitaut.c:6342:13 Step #5: #10 0x55d54afa8076 in Create_INChI /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichimake.c:4534:9 Step #5: #11 0x55d54af48263 in CreateOneComponentINChI /src/inchi/INCHI-1-SRC/INCHI_BASE/src/runichi.c:1840:14 Step #5: #12 0x55d54af474f6 in CreateOneStructureINChI /src/inchi/INCHI-1-SRC/INCHI_BASE/src/runichi.c:1411:16 Step #5: #13 0x55d54af45bb2 in ProcessOneStructure /src/inchi/INCHI-1-SRC/INCHI_BASE/src/runichi.c:325:17 Step #5: #14 0x55d54b04978a in MakeInChIOutOfStrFromINChI2 /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichirvr1.c:5816:11 Step #5: #15 0x55d54b036add in OneInChI2Atom /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichirvr4.c:3555:15 Step #5: #16 0x55d54b00333b in InChI2Atom /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichirvr7.c:230:11 Step #5: #17 0x55d54b0047c5 in AllInchiToStructure /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichirvr7.c:1147:23 Step #5: #18 0x55d54aff10b9 in ConvertInChI2Struct /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichiread.c:11310:11 Step #5: #19 0x55d54afeb201 in ReadWriteInChI /src/inchi/INCHI-1-SRC/INCHI_BASE/src/ichiread.c:1055:23 Step #5: #20 0x55d54af31076 in GetStructFromINCHIEx /src/inchi/INCHI-1-SRC/INCHI_API/libinchi/src/inchi_dll.c:2695:16 Step #5: #21 0x55d54af30ab5 in GetStructFromINCHI /src/inchi/INCHI-1-SRC/INCHI_API/libinchi/src/inchi_dll.c:2850:11 Step #5: #22 0x55d54af2b3c6 in LLVMFuzzerTestOneInput /src/inchi_input_fuzzer.c:49:3 Step #5: #23 0x55d54ae8d930 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55d54ae96f00 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55d54ae7e4b5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55d54aea98e2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f0194c8c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55d54ae70d8d in _start (out/libfuzzer-coverage-x86_64/inchi_input_fuzzer+0x22d8d) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x49,0x6e,0x43,0x68,0x49,0x3d,0x31,0x2f,0x48,0x2f,0x71,0x2b,0x31,0x2f,0x69,0x31,0x2b,0x32,0x32,0x32, Step #5: InChI=1/H/q+1/i1+222 Step #5: artifact_prefix='./'; Test unit written to ./crash-20554fecaae977209f88b0a339007fc96dccb7b7 Step #5: Base64: SW5DaEk9MS9IL3ErMS9pMSsyMjI= Step #5: MERGE-OUTER: attempt 2 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4283838521 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/inchi_input_fuzzer/regressions/20554fecaae977209f88b0a339007fc96dccb7b7' caused a failure at the previous merge step Step #5: MERGE-INNER: 9646 total files; 2722 processed earlier; will process 6924 files now Step #5: #1 pulse exec/s: 0 rss: 31Mb Step #5: #2 pulse exec/s: 0 rss: 31Mb Step #5: #4 pulse exec/s: 0 rss: 32Mb Step #5: #8 pulse exec/s: 0 rss: 32Mb Step #5: #16 pulse exec/s: 0 rss: 32Mb Step #5: #32 pulse exec/s: 0 rss: 32Mb Step #5: #64 pulse exec/s: 0 rss: 37Mb Step #5: #128 pulse exec/s: 0 rss: 37Mb Step #5: #256 pulse exec/s: 0 rss: 56Mb Step #5: #512 pulse exec/s: 512 rss: 56Mb Step #5: #1024 pulse exec/s: 204 rss: 62Mb Step #5: malloc(): invalid next->prev_inuse (unsorted) Step #5: ==46== ERROR: libFuzzer: deadly signal Step #5: ==39== libFuzzer: run interrupted; exiting Step #5: ==46== libFuzzer: run interrupted; exiting Step #5: du: cannot access '/workspace/out/libfuzzer-coverage-x86_64/dumps/inchi_input_fuzzer.*.profraw': No such file or directory Step #5: error: /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: No such file or directory Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image inchi Step #5: python infra/helper.py build_fuzzers --sanitizer coverage inchi Step #5: python infra/helper.py coverage inchi Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1