starting build "58645a3d-49a2-4908-8aee-2ba50105fa0a" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Step #1: ***** NOTICE ***** Step #1: Step #1: Alternative official `docker` images, including multiple versions across Step #1: multiple platforms, are maintained by the Docker Team. For details, please Step #1: visit https://hub.docker.com/_/docker. Step #1: Step #1: ***** END OF NOTICE ***** Step #1: Step #1: Sending build context to Docker daemon 8.704kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: 7b378fa0f908: Pulling fs layer Step #1: 4d77b1b29f2e: Pulling fs layer Step #1: 7c793be88bae: Pulling fs layer Step #1: ecc05c8a19c0: Pulling fs layer Step #1: 3fed19a54e6d: Pulling fs layer Step #1: ab924644a5ba: Pulling fs layer Step #1: 2841d9d854fc: Pulling fs layer Step #1: 783d57b537b2: Pulling fs layer Step #1: 3d61050a5305: Pulling fs layer Step #1: d1c606f1de74: Pulling fs layer Step #1: ed58da1083b7: Pulling fs layer Step #1: 72a0a7e54e04: Pulling fs layer Step #1: 9781aa044c9f: Pulling fs layer Step #1: ecc05c8a19c0: Waiting Step #1: 279f8e8d162d: Pulling fs layer Step #1: 26e478d25837: Pulling fs layer Step #1: 31ba8d54cd7e: Pulling fs layer Step #1: a74a3b8b08fd: Pulling fs layer Step #1: 3fed19a54e6d: Waiting Step #1: 528fcd2046ac: Pulling fs layer Step #1: 25568da7eef0: Pulling fs layer Step #1: ab924644a5ba: Waiting Step #1: 8df7fec07e6e: Pulling fs layer Step #1: 2d26756382b3: Pulling fs layer Step #1: b2038180092c: Pulling fs layer Step #1: 7fa69fd4dcdf: Pulling fs layer Step #1: 2841d9d854fc: Waiting Step #1: d5c690a1b5d8: Pulling fs layer Step #1: 783d57b537b2: Waiting Step #1: 3d61050a5305: Waiting Step #1: d1c606f1de74: Waiting Step #1: 31ba8d54cd7e: Waiting Step #1: 26e478d25837: Waiting Step #1: a74a3b8b08fd: Waiting Step #1: ed58da1083b7: Waiting Step #1: 528fcd2046ac: Waiting Step #1: 279f8e8d162d: Waiting Step #1: 25568da7eef0: Waiting Step #1: 9781aa044c9f: Waiting Step #1: 8df7fec07e6e: Waiting Step #1: 72a0a7e54e04: Waiting Step #1: b2038180092c: Waiting Step #1: 2d26756382b3: Waiting Step #1: d5c690a1b5d8: Waiting Step #1: 7c793be88bae: Download complete Step #1: ecc05c8a19c0: Download complete Step #1: 4d77b1b29f2e: Download complete Step #1: ab924644a5ba: Verifying Checksum Step #1: ab924644a5ba: Download complete Step #1: 3fed19a54e6d: Verifying Checksum Step #1: 3fed19a54e6d: Download complete Step #1: 783d57b537b2: Verifying Checksum Step #1: 783d57b537b2: Download complete Step #1: 2841d9d854fc: Verifying Checksum Step #1: 2841d9d854fc: Download complete Step #1: d1c606f1de74: Download complete Step #1: 7b378fa0f908: Verifying Checksum Step #1: 7b378fa0f908: Download complete Step #1: 72a0a7e54e04: Verifying Checksum Step #1: 72a0a7e54e04: Download complete Step #1: 9781aa044c9f: Verifying Checksum Step #1: 9781aa044c9f: Download complete Step #1: ed58da1083b7: Verifying Checksum Step #1: ed58da1083b7: Download complete Step #1: 7b378fa0f908: Pull complete Step #1: 26e478d25837: Verifying Checksum Step #1: 26e478d25837: Download complete Step #1: 4d77b1b29f2e: Pull complete Step #1: 7c793be88bae: Pull complete Step #1: ecc05c8a19c0: Pull complete Step #1: 279f8e8d162d: Verifying Checksum Step #1: 279f8e8d162d: Download complete Step #1: 3fed19a54e6d: Pull complete Step #1: a74a3b8b08fd: Verifying Checksum Step #1: ab924644a5ba: Pull complete Step #1: 528fcd2046ac: Verifying Checksum Step #1: 528fcd2046ac: Download complete Step #1: 25568da7eef0: Download complete Step #1: 31ba8d54cd7e: Verifying Checksum Step #1: 31ba8d54cd7e: Download complete Step #1: 3d61050a5305: Verifying Checksum Step #1: 3d61050a5305: Download complete Step #1: b2038180092c: Verifying Checksum Step #1: b2038180092c: Download complete Step #1: 7fa69fd4dcdf: Verifying Checksum Step #1: 7fa69fd4dcdf: Download complete Step #1: d5c690a1b5d8: Verifying Checksum Step #1: d5c690a1b5d8: Download complete Step #1: 8df7fec07e6e: Verifying Checksum Step #1: 8df7fec07e6e: Download complete Step #1: 2d26756382b3: Verifying Checksum Step #1: 2d26756382b3: Download complete Step #1: 2841d9d854fc: Pull complete Step #1: 783d57b537b2: Pull complete Step #1: 3d61050a5305: Pull complete Step #1: d1c606f1de74: Pull complete Step #1: ed58da1083b7: Pull complete Step #1: 72a0a7e54e04: Pull complete Step #1: 9781aa044c9f: Pull complete Step #1: 279f8e8d162d: Pull complete Step #1: 26e478d25837: Pull complete Step #1: 31ba8d54cd7e: Pull complete Step #1: a74a3b8b08fd: Pull complete Step #1: 528fcd2046ac: Pull complete Step #1: 25568da7eef0: Pull complete Step #1: 8df7fec07e6e: Pull complete Step #1: 2d26756382b3: Pull complete Step #1: b2038180092c: Pull complete Step #1: 7fa69fd4dcdf: Pull complete Step #1: d5c690a1b5d8: Pull complete Step #1: Digest: sha256:49de5cb33089700ace8429acdb954857a4a73766ab52261b4e6ad3f2b76da572 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 703f04806671 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y make autoconf automake libtool Step #1: ---> Running in a206b28ad552 Step #1: Get:1 http://security.ubuntu.com/ubuntu xenial-security InRelease [109 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu xenial InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu xenial-updates InRelease [109 kB] Step #1: Hit:4 http://ppa.launchpad.net/git-core/ppa/ubuntu xenial InRelease Step #1: Get:5 http://archive.ubuntu.com/ubuntu xenial-backports InRelease [107 kB] Step #1: Fetched 325 kB in 0s (484 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.1-6). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev libltdl-dev libltdl7 libsigsegv2 m4 Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran Step #1: | fortran95-compiler gcj-jdk Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev libltdl-dev libltdl7 libsigsegv2 libtool m4 Step #1: 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 1472 kB of archives. Step #1: After this operation, 5939 kB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu xenial/main amd64 libsigsegv2 amd64 2.10-4 [14.1 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu xenial/main amd64 m4 amd64 1.4.17-5 [195 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu xenial/main amd64 autoconf all 2.69-9 [321 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu xenial/main amd64 autotools-dev all 20150820.1 [39.8 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu xenial/main amd64 automake all 1:1.15-4ubuntu1 [510 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu xenial/main amd64 libltdl7 amd64 2.4.6-0.1 [38.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu xenial/main amd64 libltdl-dev amd64 2.4.6-0.1 [162 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu xenial/main amd64 libtool all 2.4.6-0.1 [193 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 1472 kB in 0s (2064 kB/s) Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17484 files and directories currently installed.) Step #1: Preparing to unpack .../libsigsegv2_2.10-4_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.10-4) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../archives/m4_1.4.17-5_amd64.deb ... Step #1: Unpacking m4 (1.4.17-5) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../autoconf_2.69-9_all.deb ... Step #1: Unpacking autoconf (2.69-9) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../autotools-dev_20150820.1_all.deb ... Step #1: Unpacking autotools-dev (20150820.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../automake_1%3a1.15-4ubuntu1_all.deb ... Step #1: Unpacking automake (1:1.15-4ubuntu1) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../libltdl7_2.4.6-0.1_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-0.1) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../libltdl-dev_2.4.6-0.1_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-0.1) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../libtool_2.4.6-0.1_all.deb ... Step #1: Unpacking libtool (2.4.6-0.1) ... Step #1: Processing triggers for libc-bin (2.23-0ubuntu11.2) ... Step #1: Setting up libsigsegv2:amd64 (2.10-4) ... Step #1: Setting up m4 (1.4.17-5) ... Step #1: Setting up autoconf (2.69-9) ... Step #1: Setting up autotools-dev (20150820.1) ... Step #1: Setting up automake (1:1.15-4ubuntu1) ... Step #1: update-alternatives: using /usr/bin/automake-1.15 to provide /usr/bin/automake (automake) in auto mode Step #1: Setting up libltdl7:amd64 (2.4.6-0.1) ... Step #1: Setting up libltdl-dev:amd64 (2.4.6-0.1) ... Step #1: Setting up libtool (2.4.6-0.1) ... Step #1: Processing triggers for libc-bin (2.23-0ubuntu11.2) ... Step #1: Removing intermediate container a206b28ad552 Step #1: ---> 15f126315eec Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/madler/zlib.git Step #1: ---> Running in 4eee13f03c0b Step #1: Cloning into 'zlib'... Step #1: Removing intermediate container 4eee13f03c0b Step #1: ---> dd021918e619 Step #1: Step 4/5 : WORKDIR zlib Step #1: ---> Running in 8ac480a15d8b Step #1: Removing intermediate container 8ac480a15d8b Step #1: ---> e2511e1fda68 Step #1: Step 5/5 : COPY build.sh bad_example_fuzzer.cc $SRC/ Step #1: ---> 82d0493b3b91 Step #1: Successfully built 82d0493b3b91 Step #1: Successfully tagged gcr.io/oss-fuzz/bad_example:latest Finished Step #1 Starting Step #2 Step #2: Already have image: gcr.io/oss-fuzz/bad_example Step #2: ++ tempfile Step #2: + SRCMAP=/tmp/filegpGGcb Step #2: + echo '{}' Step #2: + PATHS_TO_SCAN=/src Step #2: + [[ c++ == \g\o ]] Step #2: ++ find /src -name .git -type d Step #2: + for DOT_GIT_DIR in '$(find $PATHS_TO_SCAN -name ".git" -type d)' Step #2: ++ dirname /src/zlib/.git Step #2: + GIT_DIR=/src/zlib Step #2: + cd /src/zlib Step #2: ++ git config --get remote.origin.url Step #2: + GIT_URL=https://github.com/madler/zlib.git Step #2: ++ git rev-parse HEAD Step #2: + GIT_REV=cacf7f1d4e3d44d871b605da3b647f07d718623f Step #2: + jq_inplace /tmp/filegpGGcb '."/src/zlib" = { type: "git", url: "https://github.com/madler/zlib.git", rev: "cacf7f1d4e3d44d871b605da3b647f07d718623f" }' Step #2: ++ tempfile Step #2: + F=/tmp/fileyHRn6e Step #2: + cat /tmp/filegpGGcb Step #2: + jq '."/src/zlib" = { type: "git", url: "https://github.com/madler/zlib.git", rev: "cacf7f1d4e3d44d871b605da3b647f07d718623f" }' Step #2: + mv /tmp/fileyHRn6e /tmp/filegpGGcb Step #2: + for DOT_GIT_DIR in '$(find $PATHS_TO_SCAN -name ".git" -type d)' Step #2: ++ dirname /src/afl/.git Step #2: + GIT_DIR=/src/afl Step #2: + cd /src/afl Step #2: ++ git config --get remote.origin.url Step #2: + GIT_URL=https://github.com/google/AFL.git Step #2: ++ git rev-parse HEAD Step #2: + GIT_REV=82b5e359463238d790cadbe2dd494d6a4928bff3 Step #2: + jq_inplace /tmp/filegpGGcb '."/src/afl" = { type: "git", url: "https://github.com/google/AFL.git", rev: "82b5e359463238d790cadbe2dd494d6a4928bff3" }' Step #2: ++ tempfile Step #2: + F=/tmp/file1sDped Step #2: + cat /tmp/filegpGGcb Step #2: + jq '."/src/afl" = { type: "git", url: "https://github.com/google/AFL.git", rev: "82b5e359463238d790cadbe2dd494d6a4928bff3" }' Step #2: + mv /tmp/file1sDped /tmp/filegpGGcb Step #2: ++ find /src -name .svn -type d Step #2: ++ find /src -name .hg -type d Step #2: + '[' '' '!=' '' ']' Step #2: + cat /tmp/filegpGGcb Step #2: + rm /tmp/filegpGGcb Step #2: { Step #2: "/src/zlib": { Step #2: "type": "git", Step #2: "url": "https://github.com/madler/zlib.git", Step #2: "rev": "cacf7f1d4e3d44d871b605da3b647f07d718623f" Step #2: }, Step #2: "/src/afl": { Step #2: "type": "git", Step #2: "url": "https://github.com/google/AFL.git", Step #2: "rev": "82b5e359463238d790cadbe2dd494d6a4928bff3" Step #2: } Step #2: } Finished Step #2 Starting Step #3 Step #3: Pulling image: gcr.io/oss-fuzz-base/msan-libs-builder Step #3: Using default tag: latest Step #3: latest: Pulling from oss-fuzz-base/msan-libs-builder Step #3: 7b378fa0f908: Already exists Step #3: 4d77b1b29f2e: Already exists Step #3: 7c793be88bae: Already exists Step #3: ecc05c8a19c0: Already exists Step #3: 4aeb2ecfddb5: Pulling fs layer Step #3: fe9f907d6a5f: Pulling fs layer Step #3: eb8b7caaa724: Pulling fs layer Step #3: d7594e99d12a: Pulling fs layer Step #3: 1ee599d3a1f4: Pulling fs layer Step #3: bb3f67cc62cb: Pulling fs layer Step #3: 3145ec7103f9: Pulling fs layer Step #3: 60b4a96def5c: Pulling fs layer Step #3: 1a8b12492770: Pulling fs layer Step #3: 1c2f1279378c: Pulling fs layer Step #3: 14b5398ba4b3: Pulling fs layer Step #3: b334e08ef466: Pulling fs layer Step #3: 1bb35084ef1c: Pulling fs layer Step #3: d7594e99d12a: Waiting Step #3: 1ee599d3a1f4: Waiting Step #3: 1a8b12492770: Waiting Step #3: 1c2f1279378c: Waiting Step #3: 14b5398ba4b3: Waiting Step #3: bb3f67cc62cb: Waiting Step #3: 3145ec7103f9: Waiting Step #3: b334e08ef466: Waiting Step #3: 60b4a96def5c: Waiting Step #3: 1bb35084ef1c: Waiting Step #3: fe9f907d6a5f: Download complete Step #3: d7594e99d12a: Verifying Checksum Step #3: d7594e99d12a: Download complete Step #3: 4aeb2ecfddb5: Verifying Checksum Step #3: 4aeb2ecfddb5: Download complete Step #3: bb3f67cc62cb: Verifying Checksum Step #3: bb3f67cc62cb: Download complete Step #3: eb8b7caaa724: Verifying Checksum Step #3: eb8b7caaa724: Download complete Step #3: 3145ec7103f9: Download complete Step #3: 1a8b12492770: Verifying Checksum Step #3: 1a8b12492770: Download complete Step #3: 1c2f1279378c: Verifying Checksum Step #3: 1c2f1279378c: Download complete Step #3: 14b5398ba4b3: Verifying Checksum Step #3: 14b5398ba4b3: Download complete Step #3: b334e08ef466: Verifying Checksum Step #3: b334e08ef466: Download complete Step #3: 4aeb2ecfddb5: Pull complete Step #3: 60b4a96def5c: Verifying Checksum Step #3: 60b4a96def5c: Download complete Step #3: fe9f907d6a5f: Pull complete Step #3: eb8b7caaa724: Pull complete Step #3: d7594e99d12a: Pull complete Step #3: 1ee599d3a1f4: Verifying Checksum Step #3: 1ee599d3a1f4: Download complete Step #3: 1bb35084ef1c: Verifying Checksum Step #3: 1bb35084ef1c: Download complete Step #3: 1ee599d3a1f4: Pull complete Step #3: bb3f67cc62cb: Pull complete Step #3: 3145ec7103f9: Pull complete Step #3: 60b4a96def5c: Pull complete Step #3: 1a8b12492770: Pull complete Step #3: 1c2f1279378c: Pull complete Step #3: 14b5398ba4b3: Pull complete Step #3: b334e08ef466: Pull complete Step #3: 1bb35084ef1c: Pull complete Step #3: Digest: sha256:335f8f183251738e8a2b535be8dcc129e5d9bb506f648f6ab7426fade35917bb Step #3: Status: Downloaded newer image for gcr.io/oss-fuzz-base/msan-libs-builder:latest Step #3: gcr.io/oss-fuzz-base/msan-libs-builder:latest Finished Step #3 Starting Step #4 Step #4: Already have image: gcr.io/oss-fuzz/bad_example Step #4: --------------------------------------------------------------- Step #4: ar: creating /usr/lib/libFuzzingEngine.a Step #4: Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #4: --------------------------------------------------------------- Step #4: CC=clang Step #4: CXX=clang++ Step #4: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #4: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #4: --------------------------------------------------------------- Step #4: + ./configure Step #4: Checking for shared library support... Step #4: Building shared library libz.so.1.2.11 with clang. Step #4: Checking for size_t... Yes. Step #4: Checking for off64_t... Yes. Step #4: Checking for fseeko... Yes. Step #4: Checking for strerror... Yes. Step #4: Checking for unistd.h... Yes. Step #4: Checking for stdarg.h... Yes. Step #4: Checking whether to use vs[n]printf() or s[n]printf()... using vs[n]printf(). Step #4: Checking for vsnprintf() in stdio.h... Yes. Step #4: Checking for return value of vsnprintf()... Yes. Step #4: Checking for attribute(visibility) support... Yes. Step #4: ++ nproc Step #4: + make -j32 clean Step #4: rm -f *.o *.lo *~ \ Step #4: example minigzip examplesh minigzipsh \ Step #4: example64 minigzip64 \ Step #4: infcover \ Step #4: libz.* foo.gz so_locations \ Step #4: _match.s maketree contrib/infback9/*.o Step #4: rm -rf objs Step #4: rm -f *.gcda *.gcno *.gcov Step #4: rm -f contrib/infback9/*.gcda contrib/infback9/*.gcno contrib/infback9/*.gcov Step #4: ++ nproc Step #4: + make -j32 all Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o example.o test/example.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o adler32.o adler32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o crc32.o crc32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o deflate.o deflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o infback.o infback.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inffast.o inffast.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inflate.o inflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inftrees.o inftrees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o trees.o trees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o zutil.o zutil.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o compress.o compress.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o uncompr.o uncompr.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzclose.o gzclose.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzlib.o gzlib.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzread.o gzread.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzwrite.o gzwrite.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o minigzip.o test/minigzip.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/adler32.o adler32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/crc32.o crc32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/deflate.o deflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inffast.o inffast.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/infback.o infback.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inflate.o inflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inftrees.o inftrees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/trees.o trees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/zutil.o zutil.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/compress.o compress.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/uncompr.o uncompr.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzread.o gzread.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzwrite.o gzwrite.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzclose.o gzclose.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzlib.o gzlib.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o example64.o test/example.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o minigzip64.o test/minigzip.c Step #4: ar rc libz.a adler32.o crc32.o deflate.o infback.o inffast.o inflate.o inftrees.o trees.o zutil.o compress.o uncompr.o gzclose.o gzlib.o gzread.o gzwrite.o Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example example.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip minigzip.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example64 example64.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip64 minigzip64.o -L. libz.a Step #4: clang -shared -Wl,-soname,libz.so.1,--version-script,zlib.map -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o libz.so.1.2.11 adler32.lo crc32.lo deflate.lo infback.lo inffast.lo inflate.lo inftrees.lo trees.lo zutil.lo compress.lo uncompr.lo gzclose.lo gzlib.lo gzread.lo gzwrite.lo -lc Step #4: rm -f libz.so libz.so.1 Step #4: ln -s libz.so.1.2.11 libz.so Step #4: ln -s libz.so.1.2.11 libz.so.1 Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o examplesh example.o -L. libz.so.1.2.11 Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzipsh minigzip.o -L. libz.so.1.2.11 Step #4: + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -std=c++11 -I. /src/bad_example_fuzzer.cc -o /workspace/out/address/bad_example_valid_build -fsanitize=fuzzer ./libz.a Step #4: + ./configure Step #4: Checking for shared library support... Step #4: Building shared library libz.so.1.2.11 with clang. Step #4: Checking for size_t... Yes. Step #4: Checking for off64_t... Yes. Step #4: Checking for fseeko... Yes. Step #4: Checking for strerror... Yes. Step #4: Checking for unistd.h... Yes. Step #4: Checking for stdarg.h... Yes. Step #4: Checking whether to use vs[n]printf() or s[n]printf()... using vs[n]printf(). Step #4: Checking for vsnprintf() in stdio.h... Yes. Step #4: Checking for return value of vsnprintf()... Yes. Step #4: Checking for attribute(visibility) support... Yes. Step #4: ++ nproc Step #4: + make -j32 clean Step #4: rm -f *.o *.lo *~ \ Step #4: example minigzip examplesh minigzipsh \ Step #4: example64 minigzip64 \ Step #4: infcover \ Step #4: libz.* foo.gz so_locations \ Step #4: _match.s maketree contrib/infback9/*.o Step #4: rm -rf objs Step #4: rm -f *.gcda *.gcno *.gcov Step #4: rm -f contrib/infback9/*.gcda contrib/infback9/*.gcno contrib/infback9/*.gcov Step #4: ++ nproc Step #4: + make -j32 all Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o example.o test/example.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o adler32.o adler32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o crc32.o crc32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o deflate.o deflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o infback.o infback.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inffast.o inffast.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inflate.o inflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inftrees.o inftrees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o trees.o trees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o zutil.o zutil.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o compress.o compress.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o uncompr.o uncompr.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzclose.o gzclose.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzlib.o gzlib.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzread.o gzread.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzwrite.o gzwrite.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o minigzip.o test/minigzip.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/adler32.o adler32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/crc32.o crc32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/deflate.o deflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/infback.o infback.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inffast.o inffast.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inflate.o inflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inftrees.o inftrees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/trees.o trees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/zutil.o zutil.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/uncompr.o uncompr.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzread.o gzread.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/compress.o compress.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzclose.o gzclose.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzwrite.o gzwrite.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzlib.o gzlib.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o example64.o test/example.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o minigzip64.o test/minigzip.c Step #4: ar rc libz.a adler32.o crc32.o deflate.o infback.o inffast.o inflate.o inftrees.o trees.o zutil.o compress.o uncompr.o gzclose.o gzlib.o gzread.o gzwrite.o Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example example.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip minigzip.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example64 example64.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip64 minigzip64.o -L. libz.a Step #4: clang -shared -Wl,-soname,libz.so.1,--version-script,zlib.map -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o libz.so.1.2.11 adler32.lo crc32.lo deflate.lo infback.lo inffast.lo inflate.lo inftrees.lo trees.lo zutil.lo compress.lo uncompr.lo gzclose.lo gzlib.lo gzread.lo gzwrite.lo -lc Step #4: rm -f libz.so libz.so.1 Step #4: ln -s libz.so.1.2.11 libz.so Step #4: ln -s libz.so.1.2.11 libz.so.1 Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o examplesh example.o -L. libz.so.1.2.11 Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzipsh minigzip.o -L. libz.so.1.2.11 Step #4: + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -std=c++11 -I. -DINTENTIONAL_STARTUP_CRASH /src/bad_example_fuzzer.cc -o /workspace/out/address/bad_example_startup_crash -fsanitize=fuzzer ./libz.a Step #4: + [[ address = *coverage* ]] Step #4: + export 'CFLAGS_ORIG=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #4: + CFLAGS_ORIG='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link' Step #4: + export CFLAGS=-O1 Step #4: + CFLAGS=-O1 Step #4: + export 'CXXFLAGS_ORIG=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #4: + CXXFLAGS_ORIG='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #4: + export 'CXXFLAGS=-O1 -stdlib=libc++' Step #4: + CXXFLAGS='-O1 -stdlib=libc++' Step #4: + ./configure Step #4: Checking for shared library support... Step #4: Building shared library libz.so.1.2.11 with clang. Step #4: Checking for size_t... Yes. Step #4: Checking for off64_t... Yes. Step #4: Checking for fseeko... Yes. Step #4: Checking for strerror... Yes. Step #4: Checking for unistd.h... Yes. Step #4: Checking for stdarg.h... Yes. Step #4: Checking whether to use vs[n]printf() or s[n]printf()... using vs[n]printf(). Step #4: Checking for vsnprintf() in stdio.h... Yes. Step #4: Checking for return value of vsnprintf()... Yes. Step #4: Checking for attribute(visibility) support... Yes. Step #4: ++ nproc Step #4: + make -j32 clean Step #4: rm -f *.o *.lo *~ \ Step #4: example minigzip examplesh minigzipsh \ Step #4: example64 minigzip64 \ Step #4: infcover \ Step #4: libz.* foo.gz so_locations \ Step #4: _match.s maketree contrib/infback9/*.o Step #4: rm -rf objs Step #4: rm -f *.gcda *.gcno *.gcov Step #4: rm -f contrib/infback9/*.gcda contrib/infback9/*.gcno contrib/infback9/*.gcov Step #4: ++ nproc Step #4: + make -j32 all Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o example.o test/example.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o adler32.o adler32.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o crc32.o crc32.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o deflate.o deflate.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o infback.o infback.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inffast.o inffast.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inflate.o inflate.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inftrees.o inftrees.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o trees.o trees.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o zutil.o zutil.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o compress.o compress.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o uncompr.o uncompr.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzclose.o gzclose.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzlib.o gzlib.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzread.o gzread.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzwrite.o gzwrite.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o minigzip.o test/minigzip.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/adler32.o adler32.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/crc32.o crc32.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/deflate.o deflate.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/infback.o infback.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inffast.o inffast.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inftrees.o inftrees.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inflate.o inflate.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/trees.o trees.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/zutil.o zutil.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/compress.o compress.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/uncompr.o uncompr.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzread.o gzread.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzclose.o gzclose.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzwrite.o gzwrite.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzlib.o gzlib.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o example64.o test/example.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o minigzip64.o test/minigzip.c Step #4: ar rc libz.a adler32.o crc32.o deflate.o infback.o inffast.o inflate.o inftrees.o trees.o zutil.o compress.o uncompr.o gzclose.o gzlib.o gzread.o gzwrite.o Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example example.o -L. libz.a Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip minigzip.o -L. libz.a Step #4: clang -shared -Wl,-soname,libz.so.1,--version-script,zlib.map -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o libz.so.1.2.11 adler32.lo crc32.lo deflate.lo infback.lo inffast.lo inflate.lo inftrees.lo trees.lo zutil.lo compress.lo uncompr.lo gzclose.lo gzlib.lo gzread.lo gzwrite.lo -lc Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example64 example64.o -L. libz.a Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip64 minigzip64.o -L. libz.a Step #4: rm -f libz.so libz.so.1 Step #4: ln -s libz.so.1.2.11 libz.so Step #4: ln -s libz.so.1.2.11 libz.so.1 Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o examplesh example.o -L. libz.so.1.2.11 Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzipsh minigzip.o -L. libz.so.1.2.11 Step #4: + clang++ -fsanitize=address -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -std=c++11 -I. /src/bad_example_fuzzer.cc -o /workspace/out/address/bad_example_partial_instrumentation -fsanitize=fuzzer ./libz.a Step #4: + ./configure Step #4: Checking for shared library support... Step #4: Building shared library libz.so.1.2.11 with clang. Step #4: Checking for size_t... Yes. Step #4: Checking for off64_t... Yes. Step #4: Checking for fseeko... Yes. Step #4: Checking for strerror... Yes. Step #4: Checking for unistd.h... Yes. Step #4: Checking for stdarg.h... Yes. Step #4: Checking whether to use vs[n]printf() or s[n]printf()... using vs[n]printf(). Step #4: Checking for vsnprintf() in stdio.h... Yes. Step #4: Checking for return value of vsnprintf()... Yes. Step #4: Checking for attribute(visibility) support... Yes. Step #4: ++ nproc Step #4: + make -j32 clean Step #4: rm -f *.o *.lo *~ \ Step #4: example minigzip examplesh minigzipsh \ Step #4: example64 minigzip64 \ Step #4: infcover \ Step #4: libz.* foo.gz so_locations \ Step #4: _match.s maketree contrib/infback9/*.o Step #4: rm -rf objs Step #4: rm -f *.gcda *.gcno *.gcov Step #4: rm -f contrib/infback9/*.gcda contrib/infback9/*.gcno contrib/infback9/*.gcov Step #4: ++ nproc Step #4: + make -j32 all Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o example.o test/example.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o adler32.o adler32.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o crc32.o crc32.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o deflate.o deflate.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o infback.o infback.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inffast.o inffast.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inflate.o inflate.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inftrees.o inftrees.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o trees.o trees.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o zutil.o zutil.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o compress.o compress.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o uncompr.o uncompr.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzclose.o gzclose.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzlib.o gzlib.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzread.o gzread.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzwrite.o gzwrite.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o minigzip.o test/minigzip.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/adler32.o adler32.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/crc32.o crc32.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/deflate.o deflate.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/infback.o infback.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inffast.o inffast.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inflate.o inflate.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inftrees.o inftrees.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/zutil.o zutil.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/trees.o trees.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/compress.o compress.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzclose.o gzclose.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzlib.o gzlib.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzwrite.o gzwrite.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzread.o gzread.c Step #4: clang -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/uncompr.o uncompr.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o example64.o test/example.c Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o minigzip64.o test/minigzip.c Step #4: ar rc libz.a adler32.o crc32.o deflate.o infback.o inffast.o inflate.o inftrees.o trees.o zutil.o compress.o uncompr.o gzclose.o gzlib.o gzread.o gzwrite.o Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example example.o -L. libz.a Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip minigzip.o -L. libz.a Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example64 example64.o -L. libz.a Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip64 minigzip64.o -L. libz.a Step #4: clang -shared -Wl,-soname,libz.so.1,--version-script,zlib.map -O1 -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o libz.so.1.2.11 adler32.lo crc32.lo deflate.lo infback.lo inffast.lo inflate.lo inftrees.lo trees.lo zutil.lo compress.lo uncompr.lo gzclose.lo gzlib.lo gzread.lo gzwrite.lo -lc Step #4: rm -f libz.so libz.so.1 Step #4: ln -s libz.so.1.2.11 libz.so Step #4: ln -s libz.so.1.2.11 libz.so.1 Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o examplesh example.o -L. libz.so.1.2.11 Step #4: clang -O1 -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzipsh minigzip.o -L. libz.so.1.2.11 Step #4: + clang++ -fsanitize=address -O1 -stdlib=libc++ -std=c++11 -I. /src/bad_example_fuzzer.cc -o /workspace/out/address/bad_example_no_instrumentation -fsanitize=fuzzer ./libz.a Step #4: + EXTRA_SANITIZER=undefined Step #4: + [[ address = *undefined* ]] Step #4: + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined' Step #4: + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined' Step #4: + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=undefined' Step #4: + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=undefined' Step #4: + ./configure Step #4: Checking for shared library support... Step #4: Building shared library libz.so.1.2.11 with clang. Step #4: Checking for size_t... Yes. Step #4: Checking for off64_t... Yes. Step #4: Checking for fseeko... Yes. Step #4: Checking for strerror... Yes. Step #4: Checking for unistd.h... Yes. Step #4: Checking for stdarg.h... Yes. Step #4: Checking whether to use vs[n]printf() or s[n]printf()... using vs[n]printf(). Step #4: Checking for vsnprintf() in stdio.h... Yes. Step #4: Checking for return value of vsnprintf()... Yes. Step #4: Checking for attribute(visibility) support... Yes. Step #4: ++ nproc Step #4: + make -j32 clean Step #4: rm -f *.o *.lo *~ \ Step #4: example minigzip examplesh minigzipsh \ Step #4: example64 minigzip64 \ Step #4: infcover \ Step #4: libz.* foo.gz so_locations \ Step #4: _match.s maketree contrib/infback9/*.o Step #4: rm -rf objs Step #4: rm -f *.gcda *.gcno *.gcov Step #4: rm -f contrib/infback9/*.gcda contrib/infback9/*.gcno contrib/infback9/*.gcov Step #4: ++ nproc Step #4: + make -j32 all Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o example.o test/example.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o adler32.o adler32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o crc32.o crc32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o deflate.o deflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o infback.o infback.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inffast.o inffast.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inflate.o inflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o inftrees.o inftrees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o trees.o trees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o zutil.o zutil.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o compress.o compress.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o uncompr.o uncompr.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzclose.o gzclose.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzlib.o gzlib.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzread.o gzread.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -c -o gzwrite.o gzwrite.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -c -o minigzip.o test/minigzip.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/adler32.o adler32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/crc32.o crc32.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/deflate.o deflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/infback.o infback.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inffast.o inffast.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inflate.o inflate.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/inftrees.o inftrees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/trees.o trees.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/zutil.o zutil.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/uncompr.o uncompr.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/compress.o compress.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzwrite.o gzwrite.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzread.o gzread.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzlib.o gzlib.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -DPIC -c -o objs/gzclose.o gzclose.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o example64.o test/example.c Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -I. -D_FILE_OFFSET_BITS=64 -c -o minigzip64.o test/minigzip.c Step #4: ar rc libz.a adler32.o crc32.o deflate.o infback.o inffast.o inflate.o inftrees.o trees.o zutil.o compress.o uncompr.o gzclose.o gzlib.o gzread.o gzwrite.o Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example example.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip minigzip.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o example64 example64.o -L. libz.a Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzip64 minigzip64.o -L. libz.a Step #4: clang -shared -Wl,-soname,libz.so.1,--version-script,zlib.map -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -fPIC -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o libz.so.1.2.11 adler32.lo crc32.lo deflate.lo infback.lo inffast.lo inflate.lo inftrees.lo trees.lo zutil.lo compress.lo uncompr.lo gzclose.lo gzlib.lo gzread.lo gzwrite.lo -lc Step #4: rm -f libz.so libz.so.1 Step #4: ln -s libz.so.1.2.11 libz.so Step #4: ln -s libz.so.1.2.11 libz.so.1 Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o examplesh example.o -L. libz.so.1.2.11 Step #4: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fsanitize=undefined -D_LARGEFILE64_SOURCE=1 -DHAVE_HIDDEN -o minigzipsh minigzip.o -L. libz.so.1.2.11 Step #4: + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fsanitize=undefined -std=c++11 -I. /src/bad_example_fuzzer.cc -o /workspace/out/address/bad_example_mixed_sanitizers -fsanitize=fuzzer ./libz.a Finished Step #4 Starting Step #5 Step #5: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #5: Using default tag: latest Step #5: latest: Pulling from oss-fuzz-base/base-runner Step #5: 7b378fa0f908: Already exists Step #5: 4d77b1b29f2e: Already exists Step #5: 7c793be88bae: Already exists Step #5: ecc05c8a19c0: Already exists Step #5: 3fed19a54e6d: Already exists Step #5: ab924644a5ba: Already exists Step #5: 8cabbbb0f24d: Pulling fs layer Step #5: 30e8d201248f: Pulling fs layer Step #5: fd538656322d: Pulling fs layer Step #5: f6cdf15ed561: Pulling fs layer Step #5: 90c9a8744f54: Pulling fs layer Step #5: 97e3f66cbc7c: Pulling fs layer Step #5: 23244675a9d4: Pulling fs layer Step #5: 90c9a8744f54: Waiting Step #5: 97e3f66cbc7c: Waiting Step #5: 23244675a9d4: Waiting Step #5: f6cdf15ed561: Waiting Step #5: fd538656322d: Verifying Checksum Step #5: fd538656322d: Download complete Step #5: 8cabbbb0f24d: Verifying Checksum Step #5: 8cabbbb0f24d: Download complete Step #5: 30e8d201248f: Verifying Checksum Step #5: 30e8d201248f: Download complete Step #5: 90c9a8744f54: Verifying Checksum Step #5: 90c9a8744f54: Download complete Step #5: 8cabbbb0f24d: Pull complete Step #5: 97e3f66cbc7c: Verifying Checksum Step #5: 97e3f66cbc7c: Download complete Step #5: 23244675a9d4: Download complete Step #5: 30e8d201248f: Pull complete Step #5: fd538656322d: Pull complete Step #5: f6cdf15ed561: Verifying Checksum Step #5: f6cdf15ed561: Download complete Step #5: f6cdf15ed561: Pull complete Step #5: 90c9a8744f54: Pull complete Step #5: 97e3f66cbc7c: Pull complete Step #5: 23244675a9d4: Pull complete Step #5: Digest: sha256:36316125564c5d136dcb9dbf0436c5d6f15588ae05f5c4153b467e99f60af11b Step #5: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #5: gcr.io/oss-fuzz-base/base-runner:latest Step #5: INFO: performing bad build checks for /tmp/not-out/bad_example_startup_crash. Step #5: INFO: performing bad build checks for /tmp/not-out/bad_example_partial_instrumentation. Step #5: INFO: performing bad build checks for /tmp/not-out/bad_example_no_instrumentation. Step #5: INFO: performing bad build checks for /tmp/not-out/bad_example_valid_build. Step #5: INFO: performing bad build checks for /tmp/not-out/bad_example_mixed_sanitizers. Step #5: Broken fuzz targets (4): Step #5: bad_example_mixed_sanitizers: Step #5: BAD BUILD: ASan build of /tmp/not-out/bad_example_mixed_sanitizers seems to be compiled with UBSan. Step #5: bad_example_no_instrumentation: Step #5: BAD BUILD: /tmp/not-out/bad_example_no_instrumentation seems to have only partial coverage instrumentation. Step #5: bad_example_partial_instrumentation: Step #5: BAD BUILD: /tmp/not-out/bad_example_partial_instrumentation seems to have only partial coverage instrumentation. Step #5: bad_example_startup_crash: Step #5: BAD BUILD: /tmp/not-out/bad_example_startup_crash seems to have either startup crash or exit: Step #5: INFO: Seed: 1337 Step #5: INFO: Loaded 1 modules (672 inline 8-bit counters): 672 [0x7c8b70, 0x7c8e10), Step #5: INFO: Loaded 1 PC tables (672 PCs): 672 [0x583d38,0x586738), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #5: ERROR: 80% of fuzz targets seem to be broken. See the list above for a detailed information. Step #5: ******************************************************************************** Step #5: Build checks failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image bad_example Step #5: python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 bad_example Step #5: python infra/helper.py check_build --sanitizer address --engine libfuzzer --architecture x86_64 bad_example Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1