starting build "59d56e30-6dbc-4756-9fbe-8fa4bf924aef" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/8 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: ee06c35af532: Pulling fs layer Step #1: c36614e90b60: Pulling fs layer Step #1: f7916c9a38bf: Pulling fs layer Step #1: 45aba247b141: Pulling fs layer Step #1: 3373c7ec2037: Pulling fs layer Step #1: 75f33f8f2070: Pulling fs layer Step #1: 7ca928a6e048: Pulling fs layer Step #1: d63773318bc1: Pulling fs layer Step #1: d48cd156a215: Pulling fs layer Step #1: f825c78807d7: Pulling fs layer Step #1: 23baad8ed203: Pulling fs layer Step #1: 44ab4bfa873a: Pulling fs layer Step #1: 9627a9a2b1ad: Pulling fs layer Step #1: 58babef70f1b: Pulling fs layer Step #1: 76cfe82852de: Pulling fs layer Step #1: ae84697013da: Pulling fs layer Step #1: b720c9261036: Pulling fs layer Step #1: f7916c9a38bf: Waiting Step #1: 2e43624579d5: Pulling fs layer Step #1: eb77aa496973: Pulling fs layer Step #1: 82414ded40c6: Pulling fs layer Step #1: c58796fec269: Pulling fs layer Step #1: 413d06e26590: Pulling fs layer Step #1: 75f33f8f2070: Waiting Step #1: 7bd5e0879902: Pulling fs layer Step #1: 1e47901c4623: Pulling fs layer Step #1: 78311f612a03: Pulling fs layer Step #1: 09b5d9ecfd69: Pulling fs layer Step #1: 79b30ddeffc0: Pulling fs layer Step #1: 3271cdcf1f7c: Pulling fs layer Step #1: 66a39d43e4df: Pulling fs layer Step #1: 44ab4bfa873a: Waiting Step #1: 7ca928a6e048: Waiting Step #1: d63773318bc1: Waiting Step #1: 9627a9a2b1ad: Waiting Step #1: 58babef70f1b: Waiting Step #1: d48cd156a215: Waiting Step #1: 76cfe82852de: Waiting Step #1: ae84697013da: Waiting Step #1: b720c9261036: Waiting Step #1: f825c78807d7: Waiting Step #1: 2e43624579d5: Waiting Step #1: 23baad8ed203: Waiting Step #1: eb77aa496973: Waiting Step #1: 82414ded40c6: Waiting Step #1: c58796fec269: Waiting Step #1: 413d06e26590: Waiting Step #1: 7bd5e0879902: Waiting Step #1: 1e47901c4623: Waiting Step #1: 78311f612a03: Waiting Step #1: 3373c7ec2037: Waiting Step #1: 66a39d43e4df: Waiting Step #1: 45aba247b141: Waiting Step #1: 09b5d9ecfd69: Waiting Step #1: 79b30ddeffc0: Waiting Step #1: c36614e90b60: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 45aba247b141: Verifying Checksum Step #1: 45aba247b141: Download complete Step #1: f7916c9a38bf: Verifying Checksum Step #1: f7916c9a38bf: Download complete Step #1: 3373c7ec2037: Verifying Checksum Step #1: 3373c7ec2037: Download complete Step #1: 7ca928a6e048: Verifying Checksum Step #1: 7ca928a6e048: Download complete Step #1: d63773318bc1: Verifying Checksum Step #1: d63773318bc1: Download complete Step #1: ee06c35af532: Verifying Checksum Step #1: ee06c35af532: Download complete Step #1: f825c78807d7: Verifying Checksum Step #1: f825c78807d7: Download complete Step #1: 23baad8ed203: Verifying Checksum Step #1: 23baad8ed203: Download complete Step #1: 44ab4bfa873a: Verifying Checksum Step #1: 44ab4bfa873a: Download complete Step #1: 9627a9a2b1ad: Verifying Checksum Step #1: 9627a9a2b1ad: Download complete Step #1: 58babef70f1b: Verifying Checksum Step #1: 58babef70f1b: Download complete Step #1: b549f31133a9: Pull complete Step #1: 76cfe82852de: Verifying Checksum Step #1: 76cfe82852de: Download complete Step #1: ae84697013da: Verifying Checksum Step #1: ae84697013da: Download complete Step #1: b720c9261036: Verifying Checksum Step #1: b720c9261036: Download complete Step #1: 2e43624579d5: Verifying Checksum Step #1: 2e43624579d5: Download complete Step #1: eb77aa496973: Verifying Checksum Step #1: eb77aa496973: Download complete Step #1: 82414ded40c6: Verifying Checksum Step #1: 82414ded40c6: Download complete Step #1: d48cd156a215: Verifying Checksum Step #1: d48cd156a215: Download complete Step #1: 413d06e26590: Verifying Checksum Step #1: 413d06e26590: Download complete Step #1: c58796fec269: Verifying Checksum Step #1: c58796fec269: Download complete Step #1: 7bd5e0879902: Verifying Checksum Step #1: 7bd5e0879902: Download complete Step #1: 78311f612a03: Verifying Checksum Step #1: 78311f612a03: Download complete Step #1: 1e47901c4623: Verifying Checksum Step #1: 1e47901c4623: Download complete Step #1: 79b30ddeffc0: Verifying Checksum Step #1: 79b30ddeffc0: Download complete Step #1: 09b5d9ecfd69: Verifying Checksum Step #1: 09b5d9ecfd69: Download complete Step #1: 3271cdcf1f7c: Verifying Checksum Step #1: 3271cdcf1f7c: Download complete Step #1: 66a39d43e4df: Download complete Step #1: 75f33f8f2070: Verifying Checksum Step #1: 75f33f8f2070: Download complete Step #1: ee06c35af532: Pull complete Step #1: c36614e90b60: Pull complete Step #1: f7916c9a38bf: Pull complete Step #1: 45aba247b141: Pull complete Step #1: 3373c7ec2037: Pull complete Step #1: 75f33f8f2070: Pull complete Step #1: 7ca928a6e048: Pull complete Step #1: d63773318bc1: Pull complete Step #1: d48cd156a215: Pull complete Step #1: f825c78807d7: Pull complete Step #1: 23baad8ed203: Pull complete Step #1: 44ab4bfa873a: Pull complete Step #1: 9627a9a2b1ad: Pull complete Step #1: 58babef70f1b: Pull complete Step #1: 76cfe82852de: Pull complete Step #1: ae84697013da: Pull complete Step #1: b720c9261036: Pull complete Step #1: 2e43624579d5: Pull complete Step #1: eb77aa496973: Pull complete Step #1: 82414ded40c6: Pull complete Step #1: c58796fec269: Pull complete Step #1: 413d06e26590: Pull complete Step #1: 7bd5e0879902: Pull complete Step #1: 1e47901c4623: Pull complete Step #1: 78311f612a03: Pull complete Step #1: 09b5d9ecfd69: Pull complete Step #1: 79b30ddeffc0: Pull complete Step #1: 3271cdcf1f7c: Pull complete Step #1: 66a39d43e4df: Pull complete Step #1: Digest: sha256:d138a2357c04b5f9224cb9fddbd0d7c93493af3ff70861cece769de5878993e5 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> ac9fe2ae38ad Step #1: Step 2/8 : RUN apt-get update && apt-get install -y git autoconf automake libtool make libreadline-dev texinfo libjson-c-dev pkg-config bison flex python3-pip libc-ares-dev python3-dev python3-sphinx build-essential libsystemd-dev libsnmp-dev libcap-dev libelf-dev libpcre3-dev libpcre2-dev protobuf-c-compiler libprotobuf-c-dev Step #1: ---> Running in 8c3e52877f5a Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (117 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: build-essential is already the newest version (12.8ubuntu1.1). Step #1: git is already the newest version (1:2.25.1-1ubuntu3.11). Step #1: The following additional packages will be installed: Step #1: autotools-dev docutils-common file javascript-common libauthen-sasl-perl Step #1: libc-ares2 libcap2 libdata-dump-perl libelf1 libencode-locale-perl Step #1: libexpat1-dev libfile-listing-perl libfl-dev libfl2 libfont-afm-perl Step #1: libfreetype6 libglib2.0-0 libglib2.0-data libhtml-form-perl Step #1: libhtml-format-perl libhtml-parser-perl libhtml-tagset-perl Step #1: libhtml-tree-perl libhttp-cookies-perl libhttp-daemon-perl libhttp-date-perl Step #1: libhttp-message-perl libhttp-negotiate-perl libicu66 libimagequant0 Step #1: libio-html-perl libio-socket-ssl-perl libjbig0 libjpeg-turbo8 libjpeg8 Step #1: libjs-jquery libjs-sphinxdoc libjs-underscore libjson-c4 liblcms2-2 Step #1: libltdl-dev libltdl7 liblwp-mediatypes-perl liblwp-protocol-https-perl Step #1: libmagic-mgc libmagic1 libmailtools-perl libmpdec2 libmysqlclient21 Step #1: libncurses-dev libnet-http-perl libnet-smtp-ssl-perl libnet-ssleay-perl Step #1: libpaper-utils libpaper1 libpci-dev libpci3 libpcre16-3 libpcre2-16-0 Step #1: libpcre2-32-0 libpcre2-posix2 libpcre32-3 libpcrecpp0v5 libpng16-16 Step #1: libprotobuf-c1 libprotobuf17 libprotoc17 libpython3-dev libpython3-stdlib Step #1: libpython3.8 libpython3.8-dev libpython3.8-minimal libpython3.8-stdlib Step #1: libsensors-config libsensors4-dev libsensors5 libsigsegv2 libsnmp-base Step #1: libsnmp35 libtext-unidecode-perl libtiff5 libtimedate-perl libtry-tiny-perl Step #1: libudev-dev liburi-perl libwebp6 libwebpdemux2 libwebpmux3 libwrap0 Step #1: libwrap0-dev libwww-perl libwww-robotrules-perl libxml-libxml-perl Step #1: libxml-namespacesupport-perl libxml-parser-perl libxml-sax-base-perl Step #1: libxml-sax-expat-perl libxml-sax-perl libxml2 m4 mime-support mysql-common Step #1: pci.ids perl-openssl-defaults python-babel-localedata python-pip-whl python3 Step #1: python3-alabaster python3-babel python3-certifi python3-chardet Step #1: python3-distutils python3-docutils python3-idna python3-imagesize Step #1: python3-jinja2 python3-lib2to3 python3-markupsafe python3-minimal Step #1: python3-olefile python3-packaging python3-pil python3-pkg-resources Step #1: python3-pygments python3-pyparsing python3-requests python3-roman Step #1: python3-setuptools python3-six python3-tz python3-urllib3 python3-wheel Step #1: python3.8 python3.8-dev python3.8-minimal sgml-base shared-mime-info Step #1: sphinx-common tex-common ucf xdg-user-dirs xml-core zlib1g-dev Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext bison-doc flex-doc Step #1: apache2 | lighttpd | httpd libdigest-hmac-perl libgssapi-perl liblcms2-utils Step #1: libtool-doc libcrypt-ssleay-perl ncurses-doc readline-doc lm-sensors Step #1: snmp-mibs-downloader gfortran | fortran95-compiler gcj-jdk Step #1: libauthen-ntlm-perl libxml-sax-expatxs-perl m4-doc python3-doc python3-tk Step #1: python3-venv docutils-doc fonts-linuxlibertine | ttf-linux-libertine Step #1: texlive-lang-french texlive-latex-base texlive-latex-recommended Step #1: python-jinja2-doc python-pil-doc python3-pil-dbg python-pygments-doc Step #1: ttf-bitstream-vera python-pyparsing-doc python3-cryptography python3-openssl Step #1: python3-socks python-setuptools-doc dvipng imagemagick-6.q16 latexmk Step #1: libjs-mathjax python3-sphinx-rtd-theme python3-stemmer sphinx-doc Step #1: texlive-fonts-recommended texlive-latex-extra texlive-plain-generic Step #1: python3.8-venv python3.8-doc binfmt-support sgml-base-doc debhelper Step #1: texlive-base Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev bison docutils-common file flex Step #1: javascript-common libauthen-sasl-perl libc-ares-dev libc-ares2 libcap-dev Step #1: libcap2 libdata-dump-perl libelf-dev libelf1 libencode-locale-perl Step #1: libexpat1-dev libfile-listing-perl libfl-dev libfl2 libfont-afm-perl Step #1: libfreetype6 libglib2.0-0 libglib2.0-data libhtml-form-perl Step #1: libhtml-format-perl libhtml-parser-perl libhtml-tagset-perl Step #1: libhtml-tree-perl libhttp-cookies-perl libhttp-daemon-perl libhttp-date-perl Step #1: libhttp-message-perl libhttp-negotiate-perl libicu66 libimagequant0 Step #1: libio-html-perl libio-socket-ssl-perl libjbig0 libjpeg-turbo8 libjpeg8 Step #1: libjs-jquery libjs-sphinxdoc libjs-underscore libjson-c-dev libjson-c4 Step #1: liblcms2-2 libltdl-dev libltdl7 liblwp-mediatypes-perl Step #1: liblwp-protocol-https-perl libmagic-mgc libmagic1 libmailtools-perl Step #1: libmpdec2 libmysqlclient21 libncurses-dev libnet-http-perl Step #1: libnet-smtp-ssl-perl libnet-ssleay-perl libpaper-utils libpaper1 libpci-dev Step #1: libpci3 libpcre16-3 libpcre2-16-0 libpcre2-32-0 libpcre2-dev libpcre2-posix2 Step #1: libpcre3-dev libpcre32-3 libpcrecpp0v5 libpng16-16 libprotobuf-c-dev Step #1: libprotobuf-c1 libprotobuf17 libprotoc17 libpython3-dev libpython3-stdlib Step #1: libpython3.8 libpython3.8-dev libpython3.8-minimal libpython3.8-stdlib Step #1: libreadline-dev libsensors-config libsensors4-dev libsensors5 libsigsegv2 Step #1: libsnmp-base libsnmp-dev libsnmp35 libsystemd-dev libtext-unidecode-perl Step #1: libtiff5 libtimedate-perl libtool libtry-tiny-perl libudev-dev liburi-perl Step #1: libwebp6 libwebpdemux2 libwebpmux3 libwrap0 libwrap0-dev libwww-perl Step #1: libwww-robotrules-perl libxml-libxml-perl libxml-namespacesupport-perl Step #1: libxml-parser-perl libxml-sax-base-perl libxml-sax-expat-perl Step #1: libxml-sax-perl libxml2 m4 mime-support mysql-common pci.ids Step #1: perl-openssl-defaults pkg-config protobuf-c-compiler python-babel-localedata Step #1: python-pip-whl python3 python3-alabaster python3-babel python3-certifi Step #1: python3-chardet python3-dev python3-distutils python3-docutils python3-idna Step #1: python3-imagesize python3-jinja2 python3-lib2to3 python3-markupsafe Step #1: python3-minimal python3-olefile python3-packaging python3-pil python3-pip Step #1: python3-pkg-resources python3-pygments python3-pyparsing python3-requests Step #1: python3-roman python3-setuptools python3-six python3-sphinx python3-tz Step #1: python3-urllib3 python3-wheel python3.8 python3.8-dev python3.8-minimal Step #1: sgml-base shared-mime-info sphinx-common tex-common texinfo ucf Step #1: xdg-user-dirs xml-core zlib1g-dev Step #1: 0 upgraded, 164 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 49.7 MB of archives. Step #1: After this operation, 227 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.8 [717 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.8 [1902 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.8 [1675 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.8 [387 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 flex amd64 2.6.4-6.2 [317 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 sgml-base all 1.29.1 [12.4 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal/main amd64 ucf all 3.0038+nmu1 [51.6 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal/universe amd64 tex-common all 6.13 [32.7 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcap2 amd64 1:2.32-1ubuntu0.1 [15.8 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libelf1 amd64 0.176-1.1ubuntu0.1 [44.2 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.6 [1289 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.6 [6032 B] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjson-c4 amd64 0.13.1+dfsg-7ubuntu0.3 [29.3 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [640 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pkg-resources all 45.2.0-1ubuntu0.1 [130 kB] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-six all 1.14.0-2 [12.1 kB] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal/main amd64 pci.ids all 0.0~2020.03.20-1 [217 kB] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpci3 amd64 1:3.6.4-1ubuntu0.20.04.1 [26.9 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal/main amd64 libpng16-16 amd64 1.6.37-2 [179 kB] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal/main amd64 bison amd64 2:3.5.1+dfsg-1 [657 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal/main amd64 xml-core all 0.18+nmu1 [21.6 kB] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal/main amd64 docutils-common all 0.16+dfsg-2 [116 kB] Step #1: Get:39 http://archive.ubuntu.com/ubuntu focal/main amd64 javascript-common all 11 [6066 B] Step #1: Get:40 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcap-dev amd64 1:2.32-1ubuntu0.1 [33.2 kB] Step #1: Get:41 http://archive.ubuntu.com/ubuntu focal/main amd64 libdata-dump-perl all 1.23-1 [27.0 kB] Step #1: Get:42 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1: Get:43 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libelf-dev amd64 0.176-1.1ubuntu0.1 [57.1 kB] Step #1: Get:44 http://archive.ubuntu.com/ubuntu focal/main amd64 libencode-locale-perl all 1.05-1 [12.3 kB] Step #1: Get:45 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libexpat1-dev amd64 2.2.9-1ubuntu0.6 [116 kB] Step #1: Get:46 http://archive.ubuntu.com/ubuntu focal/main amd64 libtimedate-perl all 2.3200-1 [34.0 kB] Step #1: Get:47 http://archive.ubuntu.com/ubuntu focal/main amd64 libhttp-date-perl all 6.05-1 [9920 B] Step #1: Get:48 http://archive.ubuntu.com/ubuntu focal/main amd64 libfile-listing-perl all 6.04-1 [9774 B] Step #1: Get:49 http://archive.ubuntu.com/ubuntu focal/main amd64 libfl2 amd64 2.6.4-6.2 [11.5 kB] Step #1: Get:50 http://archive.ubuntu.com/ubuntu focal/main amd64 libfl-dev amd64 2.6.4-6.2 [6316 B] Step #1: Get:51 http://archive.ubuntu.com/ubuntu focal/main amd64 libfont-afm-perl all 1.20-2 [13.2 kB] Step #1: Get:52 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libfreetype6 amd64 2.10.1-2ubuntu0.3 [341 kB] Step #1: Get:53 http://archive.ubuntu.com/ubuntu focal/main amd64 libhtml-tagset-perl all 3.20-4 [12.5 kB] Step #1: Get:54 http://archive.ubuntu.com/ubuntu focal/main amd64 liburi-perl all 1.76-2 [77.5 kB] Step #1: Get:55 http://archive.ubuntu.com/ubuntu focal/main amd64 libhtml-parser-perl amd64 3.72-5 [86.3 kB] Step #1: Get:56 http://archive.ubuntu.com/ubuntu focal/main amd64 libio-html-perl all 1.001-1 [14.9 kB] Step #1: Get:57 http://archive.ubuntu.com/ubuntu focal/main amd64 liblwp-mediatypes-perl all 6.04-1 [19.5 kB] Step #1: Get:58 http://archive.ubuntu.com/ubuntu focal/main amd64 libhttp-message-perl all 6.22-1 [76.1 kB] Step #1: Get:59 http://archive.ubuntu.com/ubuntu focal/main amd64 libhtml-form-perl all 6.07-1 [22.2 kB] Step #1: Get:60 http://archive.ubuntu.com/ubuntu focal/main amd64 libhtml-tree-perl all 5.07-2 [200 kB] Step #1: Get:61 http://archive.ubuntu.com/ubuntu focal/main amd64 libhtml-format-perl all 2.12-1 [41.3 kB] Step #1: Get:62 http://archive.ubuntu.com/ubuntu focal/main amd64 libhttp-cookies-perl all 6.08-1 [18.3 kB] Step #1: Get:63 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libhttp-daemon-perl all 6.06-1ubuntu0.1 [22.0 kB] Step #1: Get:64 http://archive.ubuntu.com/ubuntu focal/main amd64 libhttp-negotiate-perl all 6.01-1 [12.5 kB] Step #1: Get:65 http://archive.ubuntu.com/ubuntu focal/main amd64 libimagequant0 amd64 2.12.2-1.1 [31.4 kB] Step #1: Get:66 http://archive.ubuntu.com/ubuntu focal/main amd64 perl-openssl-defaults amd64 4 [7192 B] Step #1: Get:67 http://archive.ubuntu.com/ubuntu focal/main amd64 libnet-ssleay-perl amd64 1.88-2ubuntu1 [291 kB] Step #1: Get:68 http://archive.ubuntu.com/ubuntu focal/main amd64 libio-socket-ssl-perl all 2.067-1 [176 kB] Step #1: Get:69 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjpeg-turbo8 amd64 2.0.3-0ubuntu1.20.04.3 [118 kB] Step #1: Get:70 http://archive.ubuntu.com/ubuntu focal/main amd64 libjpeg8 amd64 8c-2ubuntu8 [2194 B] Step #1: Get:71 http://archive.ubuntu.com/ubuntu focal/main amd64 libjs-jquery all 3.3.1~dfsg-3 [329 kB] Step #1: Get:72 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjs-underscore all 1.9.1~dfsg-1ubuntu0.20.04.1 [99.5 kB] Step #1: Get:73 http://archive.ubuntu.com/ubuntu focal/main amd64 libjs-sphinxdoc all 1.8.5-7ubuntu3 [97.1 kB] Step #1: Get:74 http://archive.ubuntu.com/ubuntu focal/main amd64 liblcms2-2 amd64 2.9-4 [140 kB] Step #1: Get:75 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:76 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:77 http://archive.ubuntu.com/ubuntu focal/main amd64 libnet-http-perl all 6.19-1 [22.8 kB] Step #1: Get:78 http://archive.ubuntu.com/ubuntu focal/main amd64 libtry-tiny-perl all 0.30-1 [20.5 kB] Step #1: Get:79 http://archive.ubuntu.com/ubuntu focal/main amd64 libwww-robotrules-perl all 6.02-1 [12.6 kB] Step #1: Get:80 http://archive.ubuntu.com/ubuntu focal/main amd64 libwww-perl all 6.43-1 [140 kB] Step #1: Get:81 http://archive.ubuntu.com/ubuntu focal/main amd64 liblwp-protocol-https-perl all 6.07-2ubuntu2 [8560 B] Step #1: Get:82 http://archive.ubuntu.com/ubuntu focal/main amd64 libnet-smtp-ssl-perl all 1.04-1 [5948 B] Step #1: Get:83 http://archive.ubuntu.com/ubuntu focal/main amd64 libmailtools-perl all 2.21-1 [80.7 kB] Step #1: Get:84 http://archive.ubuntu.com/ubuntu focal/main amd64 mysql-common all 5.8+1.0.5ubuntu2 [7496 B] Step #1: Get:85 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libmysqlclient21 amd64 8.0.35-0ubuntu0.20.04.1 [1303 kB] Step #1: Get:86 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libncurses-dev amd64 6.2-0ubuntu2.1 [340 kB] Step #1: Get:87 http://archive.ubuntu.com/ubuntu focal/main amd64 libpaper1 amd64 1.1.28 [13.0 kB] Step #1: Get:88 http://archive.ubuntu.com/ubuntu focal/main amd64 libpaper-utils amd64 1.1.28 [8400 B] Step #1: Get:89 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libudev-dev amd64 245.4-4ubuntu3.22 [19.7 kB] Step #1: Get:90 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpci-dev amd64 1:3.6.4-1ubuntu0.20.04.1 [46.6 kB] Step #1: Get:91 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre16-3 amd64 2:8.39-12ubuntu0.1 [150 kB] Step #1: Get:92 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-16-0 amd64 10.34-7ubuntu0.1 [181 kB] Step #1: Get:93 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-32-0 amd64 10.34-7ubuntu0.1 [170 kB] Step #1: Get:94 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-posix2 amd64 10.34-7ubuntu0.1 [5988 B] Step #1: Get:95 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre2-dev amd64 10.34-7ubuntu0.1 [672 kB] Step #1: Get:96 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre32-3 amd64 2:8.39-12ubuntu0.1 [140 kB] Step #1: Get:97 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcrecpp0v5 amd64 2:8.39-12ubuntu0.1 [15.5 kB] Step #1: Get:98 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpcre3-dev amd64 2:8.39-12ubuntu0.1 [540 kB] Step #1: Get:99 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libprotobuf-c1 amd64 1.3.3-1ubuntu0.1 [19.3 kB] Step #1: Get:100 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libprotobuf-c-dev amd64 1.3.3-1ubuntu0.1 [24.9 kB] Step #1: Get:101 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotobuf17 amd64 3.6.1.3-2ubuntu5.2 [798 kB] Step #1: Get:102 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libprotoc17 amd64 3.6.1.3-2ubuntu5.2 [646 kB] Step #1: Get:103 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8 amd64 3.8.10-0ubuntu1~20.04.8 [1625 kB] Step #1: Get:104 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-dev amd64 3.8.10-0ubuntu1~20.04.8 [3950 kB] Step #1: Get:105 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-dev amd64 3.8.2-0ubuntu2 [7236 B] Step #1: Get:106 http://archive.ubuntu.com/ubuntu focal/main amd64 libreadline-dev amd64 8.0-4 [141 kB] Step #1: Get:107 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsensors-config all 1:3.6.0-2ubuntu1.1 [6052 B] Step #1: Get:108 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsensors5 amd64 1:3.6.0-2ubuntu1.1 [27.2 kB] Step #1: Get:109 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsnmp-base all 5.8+dfsg-2ubuntu2.9 [205 kB] Step #1: Get:110 http://archive.ubuntu.com/ubuntu focal/main amd64 libwrap0 amd64 7.6.q-30 [46.3 kB] Step #1: Get:111 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsnmp35 amd64 5.8+dfsg-2ubuntu2.9 [978 kB] Step #1: Get:112 http://archive.ubuntu.com/ubuntu focal/main amd64 libwrap0-dev amd64 7.6.q-30 [21.7 kB] Step #1: Get:113 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsensors4-dev amd64 1:3.6.0-2ubuntu1.1 [35.6 kB] Step #1: Get:114 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsnmp-dev amd64 5.8+dfsg-2ubuntu2.9 [1154 kB] Step #1: Get:115 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libsystemd-dev amd64 245.4-4ubuntu3.22 [246 kB] Step #1: Get:116 http://archive.ubuntu.com/ubuntu focal/universe amd64 libtext-unidecode-perl all 1.30-1 [99.0 kB] Step #1: Get:117 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjbig0 amd64 2.1-3.1ubuntu0.20.04.1 [27.3 kB] Step #1: Get:118 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libwebp6 amd64 0.6.1-2ubuntu0.20.04.3 [185 kB] Step #1: Get:119 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libtiff5 amd64 4.1.0+git191117-2ubuntu0.20.04.10 [163 kB] Step #1: Get:120 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:121 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libwebpdemux2 amd64 0.6.1-2ubuntu0.20.04.3 [9560 B] Step #1: Get:122 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libwebpmux3 amd64 0.6.1-2ubuntu0.20.04.3 [19.5 kB] Step #1: Get:123 http://archive.ubuntu.com/ubuntu focal/main amd64 libxml-namespacesupport-perl all 1.12-1 [13.2 kB] Step #1: Get:124 http://archive.ubuntu.com/ubuntu focal/main amd64 libxml-sax-base-perl all 1.09-1 [18.8 kB] Step #1: Get:125 http://archive.ubuntu.com/ubuntu focal/main amd64 libxml-sax-perl all 1.02+dfsg-1 [56.2 kB] Step #1: Get:126 http://archive.ubuntu.com/ubuntu focal/main amd64 libxml-libxml-perl amd64 2.0134+dfsg-1build1 [320 kB] Step #1: Get:127 http://archive.ubuntu.com/ubuntu focal/main amd64 libxml-parser-perl amd64 2.46-1 [193 kB] Step #1: Get:128 http://archive.ubuntu.com/ubuntu focal/main amd64 libxml-sax-expat-perl all 0.51-1 [10.5 kB] Step #1: Get:129 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: Get:130 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 protobuf-c-compiler amd64 1.3.3-1ubuntu0.1 [74.7 kB] Step #1: Get:131 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python-babel-localedata all 2.6.0+dfsg.1-1ubuntu2.2 [4628 kB] Step #1: Get:132 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python-pip-whl all 20.0.2-5ubuntu1.10 [1805 kB] Step #1: Get:133 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-tz all 2019.3-1ubuntu0.20.04.0 [24.5 kB] Step #1: Get:134 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-babel all 2.6.0+dfsg.1-1ubuntu2.2 [83.5 kB] Step #1: Get:135 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-certifi all 2019.11.28-1 [149 kB] Step #1: Get:136 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-chardet all 3.0.4-4build1 [80.4 kB] Step #1: Get:137 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-dev amd64 3.8.10-0ubuntu1~20.04.8 [514 kB] Step #1: Get:138 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-lib2to3 all 3.8.10-0ubuntu1~20.04 [76.3 kB] Step #1: Get:139 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-distutils all 3.8.10-0ubuntu1~20.04 [141 kB] Step #1: Get:140 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-dev amd64 3.8.2-0ubuntu2 [1212 B] Step #1: Get:141 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-roman all 2.0.0-3build1 [8728 B] Step #1: Get:142 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-docutils all 0.16+dfsg-2 [368 kB] Step #1: Get:143 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-idna all 2.8-1 [34.6 kB] Step #1: Get:144 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-imagesize all 1.2.0-1 [5808 B] Step #1: Get:145 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-markupsafe amd64 1.1.0-1build2 [13.9 kB] Step #1: Get:146 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-jinja2 all 2.10.1-2 [95.5 kB] Step #1: Get:147 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-olefile all 0.46-2 [33.7 kB] Step #1: Get:148 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-pyparsing all 2.4.6-1 [61.3 kB] Step #1: Get:149 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-packaging all 20.3-1 [26.8 kB] Step #1: Get:150 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pil amd64 7.0.0-4ubuntu0.7 [366 kB] Step #1: Get:151 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-setuptools all 45.2.0-1ubuntu0.1 [330 kB] Step #1: Get:152 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python3-wheel all 0.34.2-1ubuntu0.1 [23.9 kB] Step #1: Get:153 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python3-pip all 20.0.2-5ubuntu1.10 [231 kB] Step #1: Get:154 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pygments all 2.3.1+dfsg-1ubuntu2.2 [579 kB] Step #1: Get:155 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-urllib3 all 1.25.8-2ubuntu0.3 [88.7 kB] Step #1: Get:156 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-requests all 2.22.0-2ubuntu1.1 [47.2 kB] Step #1: Get:157 http://archive.ubuntu.com/ubuntu focal/main amd64 sphinx-common all 1.8.5-7ubuntu3 [491 kB] Step #1: Get:158 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-alabaster all 0.7.8-1build1 [18.7 kB] Step #1: Get:159 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-sphinx all 1.8.5-7ubuntu3 [482 kB] Step #1: Get:160 http://archive.ubuntu.com/ubuntu focal/universe amd64 texinfo amd64 6.7.0.dfsg.2-5 [1375 kB] Step #1: Get:161 http://archive.ubuntu.com/ubuntu focal/main amd64 libauthen-sasl-perl all 2.1600-1 [48.7 kB] Step #1: Get:162 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libc-ares2 amd64 1.15.0-1ubuntu0.4 [36.9 kB] Step #1: Get:163 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libc-ares-dev amd64 1.15.0-1ubuntu0.4 [115 kB] Step #1: Get:164 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libjson-c-dev amd64 0.13.1+dfsg-7ubuntu0.3 [46.9 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 49.7 MB in 18s (2755 kB/s) Step #1: Selecting previously unselected package libpython3.8-minimal:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17382 files and directories currently installed.) Step #1: Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.8_amd64.deb ... Step #1: Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Selecting previously unselected package python3.8-minimal. Step #1: Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.8_amd64.deb ... Step #1: Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.8) ... Step #1: Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.8) ... Step #1: Selecting previously unselected package python3-minimal. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17665 files and directories currently installed.) Step #1: Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libmpdec2:amd64. Step #1: Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #1: Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #1: Selecting previously unselected package libpython3.8-stdlib:amd64. Step #1: Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.8_amd64.deb ... Step #1: Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Selecting previously unselected package python3.8. Step #1: Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.8_amd64.deb ... Step #1: Unpacking python3.8 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Selecting previously unselected package libpython3-stdlib:amd64. Step #1: Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package python3. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18067 files and directories currently installed.) Step #1: Preparing to unpack .../000-python3_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3 (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../001-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../002-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package flex. Step #1: Preparing to unpack .../003-flex_2.6.4-6.2_amd64.deb ... Step #1: Unpacking flex (2.6.4-6.2) ... Step #1: Selecting previously unselected package sgml-base. Step #1: Preparing to unpack .../004-sgml-base_1.29.1_all.deb ... Step #1: Unpacking sgml-base (1.29.1) ... Step #1: Selecting previously unselected package ucf. Step #1: Preparing to unpack .../005-ucf_3.0038+nmu1_all.deb ... Step #1: Moving old data out of the way Step #1: Unpacking ucf (3.0038+nmu1) ... Step #1: Selecting previously unselected package tex-common. Step #1: Preparing to unpack .../006-tex-common_6.13_all.deb ... Step #1: Unpacking tex-common (6.13) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../007-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../008-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../009-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libcap2:amd64. Step #1: Preparing to unpack .../010-libcap2_1%3a2.32-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libcap2:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Selecting previously unselected package libelf1:amd64. Step #1: Preparing to unpack .../011-libelf1_0.176-1.1ubuntu0.1_amd64.deb ... Step #1: Unpacking libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../012-libglib2.0-0_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../013-libglib2.0-data_2.64.6-1~ubuntu20.04.6_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../014-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libjson-c4:amd64. Step #1: Preparing to unpack .../015-libjson-c4_0.13.1+dfsg-7ubuntu0.3_amd64.deb ... Step #1: Unpacking libjson-c4:amd64 (0.13.1+dfsg-7ubuntu0.3) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../016-libxml2_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Selecting previously unselected package python3-pkg-resources. Step #1: Preparing to unpack .../017-python3-pkg-resources_45.2.0-1ubuntu0.1_all.deb ... Step #1: Unpacking python3-pkg-resources (45.2.0-1ubuntu0.1) ... Step #1: Selecting previously unselected package python3-six. Step #1: Preparing to unpack .../018-python3-six_1.14.0-2_all.deb ... Step #1: Unpacking python3-six (1.14.0-2) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../019-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../020-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package pci.ids. Step #1: Preparing to unpack .../021-pci.ids_0.0~2020.03.20-1_all.deb ... Step #1: Unpacking pci.ids (0.0~2020.03.20-1) ... Step #1: Selecting previously unselected package libpci3:amd64. Step #1: Preparing to unpack .../022-libpci3_1%3a3.6.4-1ubuntu0.20.04.1_amd64.deb ... Step #1: Unpacking libpci3:amd64 (1:3.6.4-1ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package libpng16-16:amd64. Step #1: Preparing to unpack .../023-libpng16-16_1.6.37-2_amd64.deb ... Step #1: Unpacking libpng16-16:amd64 (1.6.37-2) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../024-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../025-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../026-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package bison. Step #1: Preparing to unpack .../027-bison_2%3a3.5.1+dfsg-1_amd64.deb ... Step #1: Unpacking bison (2:3.5.1+dfsg-1) ... Step #1: Selecting previously unselected package xml-core. Step #1: Preparing to unpack .../028-xml-core_0.18+nmu1_all.deb ... Step #1: Unpacking xml-core (0.18+nmu1) ... Step #1: Selecting previously unselected package docutils-common. Step #1: Preparing to unpack .../029-docutils-common_0.16+dfsg-2_all.deb ... Step #1: Unpacking docutils-common (0.16+dfsg-2) ... Step #1: Selecting previously unselected package javascript-common. Step #1: Preparing to unpack .../030-javascript-common_11_all.deb ... Step #1: Unpacking javascript-common (11) ... Step #1: Selecting previously unselected package libcap-dev:amd64. Step #1: Preparing to unpack .../031-libcap-dev_1%3a2.32-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libcap-dev:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Selecting previously unselected package libdata-dump-perl. Step #1: Preparing to unpack .../032-libdata-dump-perl_1.23-1_all.deb ... Step #1: Unpacking libdata-dump-perl (1.23-1) ... Step #1: Selecting previously unselected package zlib1g-dev:amd64. Step #1: Preparing to unpack .../033-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Selecting previously unselected package libelf-dev:amd64. Step #1: Preparing to unpack .../034-libelf-dev_0.176-1.1ubuntu0.1_amd64.deb ... Step #1: Unpacking libelf-dev:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Selecting previously unselected package libencode-locale-perl. Step #1: Preparing to unpack .../035-libencode-locale-perl_1.05-1_all.deb ... Step #1: Unpacking libencode-locale-perl (1.05-1) ... Step #1: Selecting previously unselected package libexpat1-dev:amd64. Step #1: Preparing to unpack .../036-libexpat1-dev_2.2.9-1ubuntu0.6_amd64.deb ... Step #1: Unpacking libexpat1-dev:amd64 (2.2.9-1ubuntu0.6) ... Step #1: Selecting previously unselected package libtimedate-perl. Step #1: Preparing to unpack .../037-libtimedate-perl_2.3200-1_all.deb ... Step #1: Unpacking libtimedate-perl (2.3200-1) ... Step #1: Selecting previously unselected package libhttp-date-perl. Step #1: Preparing to unpack .../038-libhttp-date-perl_6.05-1_all.deb ... Step #1: Unpacking libhttp-date-perl (6.05-1) ... Step #1: Selecting previously unselected package libfile-listing-perl. Step #1: Preparing to unpack .../039-libfile-listing-perl_6.04-1_all.deb ... Step #1: Unpacking libfile-listing-perl (6.04-1) ... Step #1: Selecting previously unselected package libfl2:amd64. Step #1: Preparing to unpack .../040-libfl2_2.6.4-6.2_amd64.deb ... Step #1: Unpacking libfl2:amd64 (2.6.4-6.2) ... Step #1: Selecting previously unselected package libfl-dev:amd64. Step #1: Preparing to unpack .../041-libfl-dev_2.6.4-6.2_amd64.deb ... Step #1: Unpacking libfl-dev:amd64 (2.6.4-6.2) ... Step #1: Selecting previously unselected package libfont-afm-perl. Step #1: Preparing to unpack .../042-libfont-afm-perl_1.20-2_all.deb ... Step #1: Unpacking libfont-afm-perl (1.20-2) ... Step #1: Selecting previously unselected package libfreetype6:amd64. Step #1: Preparing to unpack .../043-libfreetype6_2.10.1-2ubuntu0.3_amd64.deb ... Step #1: Unpacking libfreetype6:amd64 (2.10.1-2ubuntu0.3) ... Step #1: Selecting previously unselected package libhtml-tagset-perl. Step #1: Preparing to unpack .../044-libhtml-tagset-perl_3.20-4_all.deb ... Step #1: Unpacking libhtml-tagset-perl (3.20-4) ... Step #1: Selecting previously unselected package liburi-perl. Step #1: Preparing to unpack .../045-liburi-perl_1.76-2_all.deb ... Step #1: Unpacking liburi-perl (1.76-2) ... Step #1: Selecting previously unselected package libhtml-parser-perl. Step #1: Preparing to unpack .../046-libhtml-parser-perl_3.72-5_amd64.deb ... Step #1: Unpacking libhtml-parser-perl (3.72-5) ... Step #1: Selecting previously unselected package libio-html-perl. Step #1: Preparing to unpack .../047-libio-html-perl_1.001-1_all.deb ... Step #1: Unpacking libio-html-perl (1.001-1) ... Step #1: Selecting previously unselected package liblwp-mediatypes-perl. Step #1: Preparing to unpack .../048-liblwp-mediatypes-perl_6.04-1_all.deb ... Step #1: Unpacking liblwp-mediatypes-perl (6.04-1) ... Step #1: Selecting previously unselected package libhttp-message-perl. Step #1: Preparing to unpack .../049-libhttp-message-perl_6.22-1_all.deb ... Step #1: Unpacking libhttp-message-perl (6.22-1) ... Step #1: Selecting previously unselected package libhtml-form-perl. Step #1: Preparing to unpack .../050-libhtml-form-perl_6.07-1_all.deb ... Step #1: Unpacking libhtml-form-perl (6.07-1) ... Step #1: Selecting previously unselected package libhtml-tree-perl. Step #1: Preparing to unpack .../051-libhtml-tree-perl_5.07-2_all.deb ... Step #1: Unpacking libhtml-tree-perl (5.07-2) ... Step #1: Selecting previously unselected package libhtml-format-perl. Step #1: Preparing to unpack .../052-libhtml-format-perl_2.12-1_all.deb ... Step #1: Unpacking libhtml-format-perl (2.12-1) ... Step #1: Selecting previously unselected package libhttp-cookies-perl. Step #1: Preparing to unpack .../053-libhttp-cookies-perl_6.08-1_all.deb ... Step #1: Unpacking libhttp-cookies-perl (6.08-1) ... Step #1: Selecting previously unselected package libhttp-daemon-perl. Step #1: Preparing to unpack .../054-libhttp-daemon-perl_6.06-1ubuntu0.1_all.deb ... Step #1: Unpacking libhttp-daemon-perl (6.06-1ubuntu0.1) ... Step #1: Selecting previously unselected package libhttp-negotiate-perl. Step #1: Preparing to unpack .../055-libhttp-negotiate-perl_6.01-1_all.deb ... Step #1: Unpacking libhttp-negotiate-perl (6.01-1) ... Step #1: Selecting previously unselected package libimagequant0:amd64. Step #1: Preparing to unpack .../056-libimagequant0_2.12.2-1.1_amd64.deb ... Step #1: Unpacking libimagequant0:amd64 (2.12.2-1.1) ... Step #1: Selecting previously unselected package perl-openssl-defaults:amd64. Step #1: Preparing to unpack .../057-perl-openssl-defaults_4_amd64.deb ... Step #1: Unpacking perl-openssl-defaults:amd64 (4) ... Step #1: Selecting previously unselected package libnet-ssleay-perl. Step #1: Preparing to unpack .../058-libnet-ssleay-perl_1.88-2ubuntu1_amd64.deb ... Step #1: Unpacking libnet-ssleay-perl (1.88-2ubuntu1) ... Step #1: Selecting previously unselected package libio-socket-ssl-perl. Step #1: Preparing to unpack .../059-libio-socket-ssl-perl_2.067-1_all.deb ... Step #1: Unpacking libio-socket-ssl-perl (2.067-1) ... Step #1: Selecting previously unselected package libjpeg-turbo8:amd64. Step #1: Preparing to unpack .../060-libjpeg-turbo8_2.0.3-0ubuntu1.20.04.3_amd64.deb ... Step #1: Unpacking libjpeg-turbo8:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #1: Selecting previously unselected package libjpeg8:amd64. Step #1: Preparing to unpack .../061-libjpeg8_8c-2ubuntu8_amd64.deb ... Step #1: Unpacking libjpeg8:amd64 (8c-2ubuntu8) ... Step #1: Selecting previously unselected package libjs-jquery. Step #1: Preparing to unpack .../062-libjs-jquery_3.3.1~dfsg-3_all.deb ... Step #1: Unpacking libjs-jquery (3.3.1~dfsg-3) ... Step #1: Selecting previously unselected package libjs-underscore. Step #1: Preparing to unpack .../063-libjs-underscore_1.9.1~dfsg-1ubuntu0.20.04.1_all.deb ... Step #1: Unpacking libjs-underscore (1.9.1~dfsg-1ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package libjs-sphinxdoc. Step #1: Preparing to unpack .../064-libjs-sphinxdoc_1.8.5-7ubuntu3_all.deb ... Step #1: Unpacking libjs-sphinxdoc (1.8.5-7ubuntu3) ... Step #1: Selecting previously unselected package liblcms2-2:amd64. Step #1: Preparing to unpack .../065-liblcms2-2_2.9-4_amd64.deb ... Step #1: Unpacking liblcms2-2:amd64 (2.9-4) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../066-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../067-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libnet-http-perl. Step #1: Preparing to unpack .../068-libnet-http-perl_6.19-1_all.deb ... Step #1: Unpacking libnet-http-perl (6.19-1) ... Step #1: Selecting previously unselected package libtry-tiny-perl. Step #1: Preparing to unpack .../069-libtry-tiny-perl_0.30-1_all.deb ... Step #1: Unpacking libtry-tiny-perl (0.30-1) ... Step #1: Selecting previously unselected package libwww-robotrules-perl. Step #1: Preparing to unpack .../070-libwww-robotrules-perl_6.02-1_all.deb ... Step #1: Unpacking libwww-robotrules-perl (6.02-1) ... Step #1: Selecting previously unselected package libwww-perl. Step #1: Preparing to unpack .../071-libwww-perl_6.43-1_all.deb ... Step #1: Unpacking libwww-perl (6.43-1) ... Step #1: Selecting previously unselected package liblwp-protocol-https-perl. Step #1: Preparing to unpack .../072-liblwp-protocol-https-perl_6.07-2ubuntu2_all.deb ... Step #1: Unpacking liblwp-protocol-https-perl (6.07-2ubuntu2) ... Step #1: Selecting previously unselected package libnet-smtp-ssl-perl. Step #1: Preparing to unpack .../073-libnet-smtp-ssl-perl_1.04-1_all.deb ... Step #1: Unpacking libnet-smtp-ssl-perl (1.04-1) ... Step #1: Selecting previously unselected package libmailtools-perl. Step #1: Preparing to unpack .../074-libmailtools-perl_2.21-1_all.deb ... Step #1: Unpacking libmailtools-perl (2.21-1) ... Step #1: Selecting previously unselected package mysql-common. Step #1: Preparing to unpack .../075-mysql-common_5.8+1.0.5ubuntu2_all.deb ... Step #1: Unpacking mysql-common (5.8+1.0.5ubuntu2) ... Step #1: Selecting previously unselected package libmysqlclient21:amd64. Step #1: Preparing to unpack .../076-libmysqlclient21_8.0.35-0ubuntu0.20.04.1_amd64.deb ... Step #1: Unpacking libmysqlclient21:amd64 (8.0.35-0ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package libncurses-dev:amd64. Step #1: Preparing to unpack .../077-libncurses-dev_6.2-0ubuntu2.1_amd64.deb ... Step #1: Unpacking libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Selecting previously unselected package libpaper1:amd64. Step #1: Preparing to unpack .../078-libpaper1_1.1.28_amd64.deb ... Step #1: Unpacking libpaper1:amd64 (1.1.28) ... Step #1: Selecting previously unselected package libpaper-utils. Step #1: Preparing to unpack .../079-libpaper-utils_1.1.28_amd64.deb ... Step #1: Unpacking libpaper-utils (1.1.28) ... Step #1: Selecting previously unselected package libudev-dev:amd64. Step #1: Preparing to unpack .../080-libudev-dev_245.4-4ubuntu3.22_amd64.deb ... Step #1: Unpacking libudev-dev:amd64 (245.4-4ubuntu3.22) ... Step #1: Selecting previously unselected package libpci-dev:amd64. Step #1: Preparing to unpack .../081-libpci-dev_1%3a3.6.4-1ubuntu0.20.04.1_amd64.deb ... Step #1: Unpacking libpci-dev:amd64 (1:3.6.4-1ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package libpcre16-3:amd64. Step #1: Preparing to unpack .../082-libpcre16-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-16-0:amd64. Step #1: Preparing to unpack .../083-libpcre2-16-0_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-16-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-32-0:amd64. Step #1: Preparing to unpack .../084-libpcre2-32-0_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-32-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-posix2:amd64. Step #1: Preparing to unpack .../085-libpcre2-posix2_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-posix2:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre2-dev:amd64. Step #1: Preparing to unpack .../086-libpcre2-dev_10.34-7ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre2-dev:amd64 (10.34-7ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre32-3:amd64. Step #1: Preparing to unpack .../087-libpcre32-3_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcrecpp0v5:amd64. Step #1: Preparing to unpack .../088-libpcrecpp0v5_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libpcre3-dev:amd64. Step #1: Preparing to unpack .../089-libpcre3-dev_2%3a8.39-12ubuntu0.1_amd64.deb ... Step #1: Unpacking libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Selecting previously unselected package libprotobuf-c1:amd64. Step #1: Preparing to unpack .../090-libprotobuf-c1_1.3.3-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libprotobuf-c1:amd64 (1.3.3-1ubuntu0.1) ... Step #1: Selecting previously unselected package libprotobuf-c-dev:amd64. Step #1: Preparing to unpack .../091-libprotobuf-c-dev_1.3.3-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libprotobuf-c-dev:amd64 (1.3.3-1ubuntu0.1) ... Step #1: Selecting previously unselected package libprotobuf17:amd64. Step #1: Preparing to unpack .../092-libprotobuf17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #1: Unpacking libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Selecting previously unselected package libprotoc17:amd64. Step #1: Preparing to unpack .../093-libprotoc17_3.6.1.3-2ubuntu5.2_amd64.deb ... Step #1: Unpacking libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Selecting previously unselected package libpython3.8:amd64. Step #1: Preparing to unpack .../094-libpython3.8_3.8.10-0ubuntu1~20.04.8_amd64.deb ... Step #1: Unpacking libpython3.8:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Selecting previously unselected package libpython3.8-dev:amd64. Step #1: Preparing to unpack .../095-libpython3.8-dev_3.8.10-0ubuntu1~20.04.8_amd64.deb ... Step #1: Unpacking libpython3.8-dev:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Selecting previously unselected package libpython3-dev:amd64. Step #1: Preparing to unpack .../096-libpython3-dev_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking libpython3-dev:amd64 (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package libreadline-dev:amd64. Step #1: Preparing to unpack .../097-libreadline-dev_8.0-4_amd64.deb ... Step #1: Unpacking libreadline-dev:amd64 (8.0-4) ... Step #1: Selecting previously unselected package libsensors-config. Step #1: Preparing to unpack .../098-libsensors-config_1%3a3.6.0-2ubuntu1.1_all.deb ... Step #1: Unpacking libsensors-config (1:3.6.0-2ubuntu1.1) ... Step #1: Selecting previously unselected package libsensors5:amd64. Step #1: Preparing to unpack .../099-libsensors5_1%3a3.6.0-2ubuntu1.1_amd64.deb ... Step #1: Unpacking libsensors5:amd64 (1:3.6.0-2ubuntu1.1) ... Step #1: Selecting previously unselected package libsnmp-base. Step #1: Preparing to unpack .../100-libsnmp-base_5.8+dfsg-2ubuntu2.9_all.deb ... Step #1: Unpacking libsnmp-base (5.8+dfsg-2ubuntu2.9) ... Step #1: Selecting previously unselected package libwrap0:amd64. Step #1: Preparing to unpack .../101-libwrap0_7.6.q-30_amd64.deb ... Step #1: Unpacking libwrap0:amd64 (7.6.q-30) ... Step #1: Selecting previously unselected package libsnmp35:amd64. Step #1: Preparing to unpack .../102-libsnmp35_5.8+dfsg-2ubuntu2.9_amd64.deb ... Step #1: Unpacking libsnmp35:amd64 (5.8+dfsg-2ubuntu2.9) ... Step #1: Selecting previously unselected package libwrap0-dev:amd64. Step #1: Preparing to unpack .../103-libwrap0-dev_7.6.q-30_amd64.deb ... Step #1: Unpacking libwrap0-dev:amd64 (7.6.q-30) ... Step #1: Selecting previously unselected package libsensors4-dev:amd64. Step #1: Preparing to unpack .../104-libsensors4-dev_1%3a3.6.0-2ubuntu1.1_amd64.deb ... Step #1: Unpacking libsensors4-dev:amd64 (1:3.6.0-2ubuntu1.1) ... Step #1: Selecting previously unselected package libsnmp-dev. Step #1: Preparing to unpack .../105-libsnmp-dev_5.8+dfsg-2ubuntu2.9_amd64.deb ... Step #1: Unpacking libsnmp-dev (5.8+dfsg-2ubuntu2.9) ... Step #1: Selecting previously unselected package libsystemd-dev:amd64. Step #1: Preparing to unpack .../106-libsystemd-dev_245.4-4ubuntu3.22_amd64.deb ... Step #1: Unpacking libsystemd-dev:amd64 (245.4-4ubuntu3.22) ... Step #1: Selecting previously unselected package libtext-unidecode-perl. Step #1: Preparing to unpack .../107-libtext-unidecode-perl_1.30-1_all.deb ... Step #1: Unpacking libtext-unidecode-perl (1.30-1) ... Step #1: Selecting previously unselected package libjbig0:amd64. Step #1: Preparing to unpack .../108-libjbig0_2.1-3.1ubuntu0.20.04.1_amd64.deb ... Step #1: Unpacking libjbig0:amd64 (2.1-3.1ubuntu0.20.04.1) ... Step #1: Selecting previously unselected package libwebp6:amd64. Step #1: Preparing to unpack .../109-libwebp6_0.6.1-2ubuntu0.20.04.3_amd64.deb ... Step #1: Unpacking libwebp6:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Selecting previously unselected package libtiff5:amd64. Step #1: Preparing to unpack .../110-libtiff5_4.1.0+git191117-2ubuntu0.20.04.10_amd64.deb ... Step #1: Unpacking libtiff5:amd64 (4.1.0+git191117-2ubuntu0.20.04.10) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../111-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package libwebpdemux2:amd64. Step #1: Preparing to unpack .../112-libwebpdemux2_0.6.1-2ubuntu0.20.04.3_amd64.deb ... Step #1: Unpacking libwebpdemux2:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Selecting previously unselected package libwebpmux3:amd64. Step #1: Preparing to unpack .../113-libwebpmux3_0.6.1-2ubuntu0.20.04.3_amd64.deb ... Step #1: Unpacking libwebpmux3:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Selecting previously unselected package libxml-namespacesupport-perl. Step #1: Preparing to unpack .../114-libxml-namespacesupport-perl_1.12-1_all.deb ... Step #1: Unpacking libxml-namespacesupport-perl (1.12-1) ... Step #1: Selecting previously unselected package libxml-sax-base-perl. Step #1: Preparing to unpack .../115-libxml-sax-base-perl_1.09-1_all.deb ... Step #1: Unpacking libxml-sax-base-perl (1.09-1) ... Step #1: Selecting previously unselected package libxml-sax-perl. Step #1: Preparing to unpack .../116-libxml-sax-perl_1.02+dfsg-1_all.deb ... Step #1: Unpacking libxml-sax-perl (1.02+dfsg-1) ... Step #1: Selecting previously unselected package libxml-libxml-perl. Step #1: Preparing to unpack .../117-libxml-libxml-perl_2.0134+dfsg-1build1_amd64.deb ... Step #1: Unpacking libxml-libxml-perl (2.0134+dfsg-1build1) ... Step #1: Selecting previously unselected package libxml-parser-perl. Step #1: Preparing to unpack .../118-libxml-parser-perl_2.46-1_amd64.deb ... Step #1: Unpacking libxml-parser-perl (2.46-1) ... Step #1: Selecting previously unselected package libxml-sax-expat-perl. Step #1: Preparing to unpack .../119-libxml-sax-expat-perl_0.51-1_all.deb ... Step #1: Unpacking libxml-sax-expat-perl (0.51-1) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../120-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Selecting previously unselected package protobuf-c-compiler. Step #1: Preparing to unpack .../121-protobuf-c-compiler_1.3.3-1ubuntu0.1_amd64.deb ... Step #1: Unpacking protobuf-c-compiler (1.3.3-1ubuntu0.1) ... Step #1: Selecting previously unselected package python-babel-localedata. Step #1: Preparing to unpack .../122-python-babel-localedata_2.6.0+dfsg.1-1ubuntu2.2_all.deb ... Step #1: Unpacking python-babel-localedata (2.6.0+dfsg.1-1ubuntu2.2) ... Step #1: Selecting previously unselected package python-pip-whl. Step #1: Preparing to unpack .../123-python-pip-whl_20.0.2-5ubuntu1.10_all.deb ... Step #1: Unpacking python-pip-whl (20.0.2-5ubuntu1.10) ... Step #1: Selecting previously unselected package python3-tz. Step #1: Preparing to unpack .../124-python3-tz_2019.3-1ubuntu0.20.04.0_all.deb ... Step #1: Unpacking python3-tz (2019.3-1ubuntu0.20.04.0) ... Step #1: Selecting previously unselected package python3-babel. Step #1: Preparing to unpack .../125-python3-babel_2.6.0+dfsg.1-1ubuntu2.2_all.deb ... Step #1: Unpacking python3-babel (2.6.0+dfsg.1-1ubuntu2.2) ... Step #1: Selecting previously unselected package python3-certifi. Step #1: Preparing to unpack .../126-python3-certifi_2019.11.28-1_all.deb ... Step #1: Unpacking python3-certifi (2019.11.28-1) ... Step #1: Selecting previously unselected package python3-chardet. Step #1: Preparing to unpack .../127-python3-chardet_3.0.4-4build1_all.deb ... Step #1: Unpacking python3-chardet (3.0.4-4build1) ... Step #1: Selecting previously unselected package python3.8-dev. Step #1: Preparing to unpack .../128-python3.8-dev_3.8.10-0ubuntu1~20.04.8_amd64.deb ... Step #1: Unpacking python3.8-dev (3.8.10-0ubuntu1~20.04.8) ... Step #1: Selecting previously unselected package python3-lib2to3. Step #1: Preparing to unpack .../129-python3-lib2to3_3.8.10-0ubuntu1~20.04_all.deb ... Step #1: Unpacking python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #1: Selecting previously unselected package python3-distutils. Step #1: Preparing to unpack .../130-python3-distutils_3.8.10-0ubuntu1~20.04_all.deb ... Step #1: Unpacking python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #1: Selecting previously unselected package python3-dev. Step #1: Preparing to unpack .../131-python3-dev_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3-dev (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package python3-roman. Step #1: Preparing to unpack .../132-python3-roman_2.0.0-3build1_all.deb ... Step #1: Unpacking python3-roman (2.0.0-3build1) ... Step #1: Selecting previously unselected package python3-docutils. Step #1: Preparing to unpack .../133-python3-docutils_0.16+dfsg-2_all.deb ... Step #1: Unpacking python3-docutils (0.16+dfsg-2) ... Step #1: Selecting previously unselected package python3-idna. Step #1: Preparing to unpack .../134-python3-idna_2.8-1_all.deb ... Step #1: Unpacking python3-idna (2.8-1) ... Step #1: Selecting previously unselected package python3-imagesize. Step #1: Preparing to unpack .../135-python3-imagesize_1.2.0-1_all.deb ... Step #1: Unpacking python3-imagesize (1.2.0-1) ... Step #1: Selecting previously unselected package python3-markupsafe. Step #1: Preparing to unpack .../136-python3-markupsafe_1.1.0-1build2_amd64.deb ... Step #1: Unpacking python3-markupsafe (1.1.0-1build2) ... Step #1: Selecting previously unselected package python3-jinja2. Step #1: Preparing to unpack .../137-python3-jinja2_2.10.1-2_all.deb ... Step #1: Unpacking python3-jinja2 (2.10.1-2) ... Step #1: Selecting previously unselected package python3-olefile. Step #1: Preparing to unpack .../138-python3-olefile_0.46-2_all.deb ... Step #1: Unpacking python3-olefile (0.46-2) ... Step #1: Selecting previously unselected package python3-pyparsing. Step #1: Preparing to unpack .../139-python3-pyparsing_2.4.6-1_all.deb ... Step #1: Unpacking python3-pyparsing (2.4.6-1) ... Step #1: Selecting previously unselected package python3-packaging. Step #1: Preparing to unpack .../140-python3-packaging_20.3-1_all.deb ... Step #1: Unpacking python3-packaging (20.3-1) ... Step #1: Selecting previously unselected package python3-pil:amd64. Step #1: Preparing to unpack .../141-python3-pil_7.0.0-4ubuntu0.7_amd64.deb ... Step #1: Unpacking python3-pil:amd64 (7.0.0-4ubuntu0.7) ... Step #1: Selecting previously unselected package python3-setuptools. Step #1: Preparing to unpack .../142-python3-setuptools_45.2.0-1ubuntu0.1_all.deb ... Step #1: Unpacking python3-setuptools (45.2.0-1ubuntu0.1) ... Step #1: Selecting previously unselected package python3-wheel. Step #1: Preparing to unpack .../143-python3-wheel_0.34.2-1ubuntu0.1_all.deb ... Step #1: Unpacking python3-wheel (0.34.2-1ubuntu0.1) ... Step #1: Selecting previously unselected package python3-pip. Step #1: Preparing to unpack .../144-python3-pip_20.0.2-5ubuntu1.10_all.deb ... Step #1: Unpacking python3-pip (20.0.2-5ubuntu1.10) ... Step #1: Selecting previously unselected package python3-pygments. Step #1: Preparing to unpack .../145-python3-pygments_2.3.1+dfsg-1ubuntu2.2_all.deb ... Step #1: Unpacking python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Selecting previously unselected package python3-urllib3. Step #1: Preparing to unpack .../146-python3-urllib3_1.25.8-2ubuntu0.3_all.deb ... Step #1: Unpacking python3-urllib3 (1.25.8-2ubuntu0.3) ... Step #1: Selecting previously unselected package python3-requests. Step #1: Preparing to unpack .../147-python3-requests_2.22.0-2ubuntu1.1_all.deb ... Step #1: Unpacking python3-requests (2.22.0-2ubuntu1.1) ... Step #1: Selecting previously unselected package sphinx-common. Step #1: Preparing to unpack .../148-sphinx-common_1.8.5-7ubuntu3_all.deb ... Step #1: Unpacking sphinx-common (1.8.5-7ubuntu3) ... Step #1: Selecting previously unselected package python3-alabaster. Step #1: Preparing to unpack .../149-python3-alabaster_0.7.8-1build1_all.deb ... Step #1: Unpacking python3-alabaster (0.7.8-1build1) ... Step #1: Selecting previously unselected package python3-sphinx. Step #1: Preparing to unpack .../150-python3-sphinx_1.8.5-7ubuntu3_all.deb ... Step #1: Unpacking python3-sphinx (1.8.5-7ubuntu3) ... Step #1: Selecting previously unselected package texinfo. Step #1: Preparing to unpack .../151-texinfo_6.7.0.dfsg.2-5_amd64.deb ... Step #1: Unpacking texinfo (6.7.0.dfsg.2-5) ... Step #1: Selecting previously unselected package libauthen-sasl-perl. Step #1: Preparing to unpack .../152-libauthen-sasl-perl_2.1600-1_all.deb ... Step #1: Unpacking libauthen-sasl-perl (2.1600-1) ... Step #1: Selecting previously unselected package libc-ares2:amd64. Step #1: Preparing to unpack .../153-libc-ares2_1.15.0-1ubuntu0.4_amd64.deb ... Step #1: Unpacking libc-ares2:amd64 (1.15.0-1ubuntu0.4) ... Step #1: Selecting previously unselected package libc-ares-dev:amd64. Step #1: Preparing to unpack .../154-libc-ares-dev_1.15.0-1ubuntu0.4_amd64.deb ... Step #1: Unpacking libc-ares-dev:amd64 (1.15.0-1ubuntu0.4) ... Step #1: Selecting previously unselected package libjson-c-dev:amd64. Step #1: Preparing to unpack .../155-libjson-c-dev_0.13.1+dfsg-7ubuntu0.3_amd64.deb ... Step #1: Unpacking libjson-c-dev:amd64 (0.13.1+dfsg-7ubuntu0.3) ... Step #1: Setting up libpcrecpp0v5:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up javascript-common (11) ... Step #1: Setting up liblcms2-2:amd64 (2.9-4) ... Step #1: Setting up mysql-common (5.8+1.0.5ubuntu2) ... Step #1: update-alternatives: using /etc/mysql/my.cnf.fallback to provide /etc/mysql/my.cnf (my.cnf) in auto mode Step #1: Setting up libmysqlclient21:amd64 (8.0.35-0ubuntu0.20.04.1) ... Step #1: Setting up libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Setting up pci.ids (0.0~2020.03.20-1) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up libpcre16-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up libfont-afm-perl (1.20-2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libsnmp-base (5.8+dfsg-2ubuntu2.9) ... Step #1: Setting up libhtml-tagset-perl (3.20-4) ... Step #1: Setting up libauthen-sasl-perl (2.1600-1) ... Step #1: Setting up liblwp-mediatypes-perl (6.04-1) ... Step #1: Setting up libtry-tiny-perl (0.30-1) ... Step #1: Setting up libsensors-config (1:3.6.0-2ubuntu1.1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up perl-openssl-defaults:amd64 (4) ... Step #1: Setting up libxml-namespacesupport-perl (1.12-1) ... Step #1: Setting up libencode-locale-perl (1.05-1) ... Step #1: Setting up libc-ares2:amd64 (1.15.0-1ubuntu0.4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up libreadline-dev:amd64 (8.0-4) ... Step #1: Setting up libprotobuf-c1:amd64 (1.3.3-1ubuntu0.1) ... Step #1: Setting up libjbig0:amd64 (2.1-3.1ubuntu0.20.04.1) ... Step #1: Setting up libpcre2-16-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up libprotobuf-c-dev:amd64 (1.3.3-1ubuntu0.1) ... Step #1: Setting up libcap2:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Setting up python-babel-localedata (2.6.0+dfsg.1-1ubuntu2.2) ... Step #1: Setting up libxml-sax-base-perl (1.09-1) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libpcre2-32-0:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Setting up libexpat1-dev:amd64 (2.2.9-1ubuntu0.6) ... Step #1: Setting up libwrap0:amd64 (7.6.q-30) ... Step #1: Setting up libdata-dump-perl (1.23-1) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libimagequant0:amd64 (2.12.2-1.1) ... Step #1: Setting up libpng16-16:amd64 (1.6.37-2) ... Step #1: Setting up libpcre32-3:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up libc-ares-dev:amd64 (1.15.0-1ubuntu0.4) ... Step #1: Setting up libio-html-perl (1.001-1) ... Step #1: Setting up libwebp6:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libudev-dev:amd64 (245.4-4ubuntu3.22) ... Step #1: Setting up libfl2:amd64 (2.6.4-6.2) ... Step #1: Setting up ucf (3.0038+nmu1) ... Step #1: Setting up libpcre2-posix2:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up libsensors5:amd64 (1:3.6.0-2ubuntu1.1) ... Step #1: Setting up libjpeg-turbo8:amd64 (2.0.3-0ubuntu1.20.04.3) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libtimedate-perl (2.3200-1) ... Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up libpci3:amd64 (1:3.6.4-1ubuntu0.20.04.1) ... Step #1: Setting up libwrap0-dev:amd64 (7.6.q-30) ... Step #1: Setting up sgml-base (1.29.1) ... Step #1: Setting up python-pip-whl (20.0.2-5ubuntu1.10) ... Step #1: Setting up libprotobuf17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libmpdec2:amd64 (2.4.2-3) ... Step #1: Setting up libjson-c4:amd64 (0.13.1+dfsg-7ubuntu0.3) ... Step #1: Setting up libjs-jquery (3.3.1~dfsg-3) ... Step #1: Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Setting up libtext-unidecode-perl (1.30-1) ... Step #1: Setting up python3.8 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Setting up libwebpmux3:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Setting up libcap-dev:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Setting up libelf1:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Setting up liburi-perl (1.76-2) ... Step #1: Setting up libsystemd-dev:amd64 (245.4-4ubuntu3.22) ... Step #1: Setting up libpci-dev:amd64 (1:3.6.4-1ubuntu0.20.04.1) ... Step #1: Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up libjs-underscore (1.9.1~dfsg-1ubuntu0.20.04.1) ... Step #1: Setting up libnet-ssleay-perl (1.88-2ubuntu1) ... Step #1: Setting up libjpeg8:amd64 (8c-2ubuntu8) ... Step #1: Setting up libpaper1:amd64 (1.1.28) ... Step #1: Step #1: Creating config file /etc/papersize with new version Step #1: Setting up libhttp-date-perl (6.05-1) ... Step #1: Setting up libprotoc17:amd64 (3.6.1.3-2ubuntu5.2) ... Step #1: Setting up libfile-listing-perl (6.04-1) ... Step #1: Setting up libsnmp35:amd64 (5.8+dfsg-2ubuntu2.9) ... Step #1: Setting up libpcre2-dev:amd64 (10.34-7ubuntu0.1) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up libpcre3-dev:amd64 (2:8.39-12ubuntu0.1) ... Step #1: Setting up libjson-c-dev:amd64 (0.13.1+dfsg-7ubuntu0.3) ... Step #1: Setting up libwebpdemux2:amd64 (0.6.1-2ubuntu0.20.04.3) ... Step #1: Setting up libnet-http-perl (6.19-1) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up python3 (3.8.2-0ubuntu2) ... Step #1: Setting up libpaper-utils (1.1.28) ... Step #1: Setting up python3-markupsafe (1.1.0-1build2) ... Step #1: Setting up libxml-sax-perl (1.02+dfsg-1) ... Step #1: update-perl-sax-parsers: Registering Perl SAX parser XML::SAX::PurePerl with priority 10... Step #1: update-perl-sax-parsers: Updating overall Perl SAX parser modules info file... Step #1: Step #1: Creating config file /etc/perl/XML/SAX/ParserDetails.ini with new version Step #1: Setting up python3-wheel (0.34.2-1ubuntu0.1) ... Step #1: Setting up python3-tz (2019.3-1ubuntu0.20.04.0) ... Step #1: Setting up libsensors4-dev:amd64 (1:3.6.0-2ubuntu1.1) ... Step #1: Setting up protobuf-c-compiler (1.3.3-1ubuntu0.1) ... Step #1: Setting up python3-six (1.14.0-2) ... Step #1: Setting up tex-common (6.13) ... Step #1: update-language: texlive-base not installed and configured, doing nothing! Step #1: Setting up python3-roman (2.0.0-3build1) ... Step #1: Setting up python3-jinja2 (2.10.1-2) ... Step #1: Setting up python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Setting up python3-pyparsing (2.4.6-1) ... Step #1: Setting up libfreetype6:amd64 (2.10.1-2ubuntu0.3) ... Step #1: Setting up python3-certifi (2019.11.28-1) ... Step #1: Setting up libpython3.8:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Setting up python3-idna (2.8-1) ... Step #1: Setting up libelf-dev:amd64 (0.176-1.1ubuntu0.1) ... Step #1: Setting up libjs-sphinxdoc (1.8.5-7ubuntu3) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up python3-urllib3 (1.25.8-2ubuntu0.3) ... Step #1: Setting up libxml-libxml-perl (2.0134+dfsg-1build1) ... Step #1: update-perl-sax-parsers: Registering Perl SAX parser XML::LibXML::SAX::Parser with priority 50... Step #1: update-perl-sax-parsers: Registering Perl SAX parser XML::LibXML::SAX with priority 50... Step #1: update-perl-sax-parsers: Updating overall Perl SAX parser modules info file... Step #1: Replacing config file /etc/perl/XML/SAX/ParserDetails.ini with new version Step #1: Setting up libwww-robotrules-perl (6.02-1) ... Step #1: Setting up libsnmp-dev (5.8+dfsg-2ubuntu2.9) ... Step #1: Setting up xml-core (0.18+nmu1) ... Step #1: Setting up libhtml-parser-perl (3.72-5) ... Step #1: Setting up bison (2:3.5.1+dfsg-1) ... Step #1: update-alternatives: using /usr/bin/bison.yacc to provide /usr/bin/yacc (yacc) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/yacc.1.gz because associated file /usr/share/man/man1/bison.yacc.1.gz (of link group yacc) doesn't exist Step #1: Setting up libtiff5:amd64 (4.1.0+git191117-2ubuntu0.20.04.10) ... Step #1: Setting up python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Step #1: Setting up libio-socket-ssl-perl (2.067-1) ... Step #1: Setting up libhttp-message-perl (6.22-1) ... Step #1: Setting up python3-imagesize (1.2.0-1) ... Step #1: Setting up libhtml-form-perl (6.07-1) ... Step #1: Setting up python3-pkg-resources (45.2.0-1ubuntu0.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up python3-distutils (3.8.10-0ubuntu1~20.04) ... Step #1: Setting up libhttp-negotiate-perl (6.01-1) ... Step #1: Setting up flex (2.6.4-6.2) ... Step #1: Setting up python3-setuptools (45.2.0-1ubuntu0.1) ... Step #1: Setting up libhttp-cookies-perl (6.08-1) ... Step #1: Setting up python3-babel (2.6.0+dfsg.1-1ubuntu2.2) ... Step #1: update-alternatives: using /usr/bin/pybabel-python3 to provide /usr/bin/pybabel (pybabel) in auto mode Step #1: Setting up python3-alabaster (0.7.8-1build1) ... Step #1: Setting up python3-olefile (0.46-2) ... Step #1: Setting up libhtml-tree-perl (5.07-2) ... Step #1: Setting up libhtml-format-perl (2.12-1) ... Step #1: Setting up libfl-dev:amd64 (2.6.4-6.2) ... Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Setting up python3-pil:amd64 (7.0.0-4ubuntu0.7) ... Step #1: Setting up python3-packaging (20.3-1) ... Step #1: Setting up python3-chardet (3.0.4-4build1) ... Step #1: Setting up libnet-smtp-ssl-perl (1.04-1) ... Step #1: Setting up libpython3.8-dev:amd64 (3.8.10-0ubuntu1~20.04.8) ... Step #1: Setting up libmailtools-perl (2.21-1) ... Step #1: Setting up sphinx-common (1.8.5-7ubuntu3) ... Step #1: Setting up python3-requests (2.22.0-2ubuntu1.1) ... Step #1: Setting up python3-pip (20.0.2-5ubuntu1.10) ... Step #1: Setting up texinfo (6.7.0.dfsg.2-5) ... Step #1: Setting up python3.8-dev (3.8.10-0ubuntu1~20.04.8) ... Step #1: Setting up libhttp-daemon-perl (6.06-1ubuntu0.1) ... Step #1: Setting up libpython3-dev:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up python3-dev (3.8.2-0ubuntu2) ... Step #1: Setting up libwww-perl (6.43-1) ... Step #1: Setting up liblwp-protocol-https-perl (6.07-2ubuntu2) ... Step #1: Setting up libxml-parser-perl (2.46-1) ... Step #1: Setting up libxml-sax-expat-perl (0.51-1) ... Step #1: update-perl-sax-parsers: Registering Perl SAX parser XML::SAX::Expat with priority 50... Step #1: update-perl-sax-parsers: Updating overall Perl SAX parser modules info file... Step #1: Replacing config file /etc/perl/XML/SAX/ParserDetails.ini with new version Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.12) ... Step #1: Processing triggers for sgml-base (1.29.1) ... Step #1: Setting up docutils-common (0.16+dfsg-2) ... Step #1: Processing triggers for sgml-base (1.29.1) ... Step #1: Setting up python3-docutils (0.16+dfsg-2) ... Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst-buildhtml to provide /usr/bin/rst-buildhtml (rst-buildhtml) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2html to provide /usr/bin/rst2html (rst2html) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2html4 to provide /usr/bin/rst2html4 (rst2html4) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2html5 to provide /usr/bin/rst2html5 (rst2html5) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2latex to provide /usr/bin/rst2latex (rst2latex) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2man to provide /usr/bin/rst2man (rst2man) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2odt to provide /usr/bin/rst2odt (rst2odt) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2odt_prepstyles to provide /usr/bin/rst2odt_prepstyles (rst2odt_prepstyles) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2pseudoxml to provide /usr/bin/rst2pseudoxml (rst2pseudoxml) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2s5 to provide /usr/bin/rst2s5 (rst2s5) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2xetex to provide /usr/bin/rst2xetex (rst2xetex) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rst2xml to provide /usr/bin/rst2xml (rst2xml) in auto mode Step #1: update-alternatives: using /usr/share/docutils/scripts/python3/rstpep2html to provide /usr/bin/rstpep2html (rstpep2html) in auto mode Step #1: Setting up python3-sphinx (1.8.5-7ubuntu3) ... Step #1: update-alternatives: using /usr/share/sphinx/scripts/python3/sphinx-apidoc to provide /usr/bin/sphinx-apidoc (sphinx-apidoc) in auto mode Step #1: update-alternatives: using /usr/share/sphinx/scripts/python3/sphinx-autogen to provide /usr/bin/sphinx-autogen (sphinx-autogen) in auto mode Step #1: update-alternatives: using /usr/share/sphinx/scripts/python3/sphinx-build to provide /usr/bin/sphinx-build (sphinx-build) in auto mode Step #1: update-alternatives: using /usr/share/sphinx/scripts/python3/sphinx-quickstart to provide /usr/bin/sphinx-quickstart (sphinx-quickstart) in auto mode Step #1: Removing intermediate container 8c3e52877f5a Step #1: ---> 318383b32b31 Step #1: Step 3/8 : RUN pip3 install pytest Step #1: ---> Running in b9dbab03af6d Step #1: Collecting pytest Step #1: Downloading https://files.pythonhosted.org/packages/f3/8c/f16efd81ca8e293b2cc78f111190a79ee539d0d5d36ccd49975cb3beac60/pytest-7.4.3-py3-none-any.whl (325kB) Step #1: Collecting iniconfig (from pytest) Step #1: Downloading https://files.pythonhosted.org/packages/ef/a6/62565a6e1cf69e10f5727360368e451d4b7f58beeac6173dc9db836a5b46/iniconfig-2.0.0-py3-none-any.whl Step #1: Collecting pluggy<2.0,>=0.12 (from pytest) Step #1: Downloading https://files.pythonhosted.org/packages/05/b8/42ed91898d4784546c5f06c60506400548db3f7a4b3fb441cba4e5c17952/pluggy-1.3.0-py3-none-any.whl Step #1: Collecting exceptiongroup>=1.0.0rc8; python_version < "3.11" (from pytest) Step #1: Downloading https://files.pythonhosted.org/packages/ad/83/b71e58666f156a39fb29417e4c8ca4bc7400c0dd4ed9e8842ab54dc8c344/exceptiongroup-1.1.3-py3-none-any.whl Step #1: Collecting tomli>=1.0.0; python_version < "3.11" (from pytest) Step #1: Downloading https://files.pythonhosted.org/packages/97/75/10a9ebee3fd790d20926a90a2547f0bf78f371b2f13aa822c759680ca7b9/tomli-2.0.1-py3-none-any.whl Step #1: Collecting packaging (from pytest) Step #1: Downloading https://files.pythonhosted.org/packages/ec/1a/610693ac4ee14fcdf2d9bf3c493370e4f2ef7ae2e19217d7a237ff42367d/packaging-23.2-py3-none-any.whl (53kB) Step #1: Installing collected packages: iniconfig, pluggy, exceptiongroup, tomli, packaging, pytest Step #1: Successfully installed exceptiongroup-1.1.3 iniconfig-2.0.0 packaging-23.2 pluggy-1.3.0 pytest-7.4.3 tomli-2.0.1 Step #1: WARNING: You are using pip version 19.2.3, however version 23.3.1 is available. Step #1: You should consider upgrading via the 'pip install --upgrade pip' command. Step #1: Removing intermediate container b9dbab03af6d Step #1: ---> 72ab8bf21f0c Step #1: Step 4/8 : RUN git clone https://github.com/CESNET/libyang.git Step #1: ---> Running in 32c463d3d822 Step #1: Cloning into 'libyang'... Step #1: Removing intermediate container 32c463d3d822 Step #1: ---> b5e176255364 Step #1: Step 5/8 : RUN git clone --depth 1 --branch fuzz https://github.com/FRRouting/frr Step #1: ---> Running in 5b1ff5101a2e Step #1: Cloning into 'frr'... Step #1: Removing intermediate container 5b1ff5101a2e Step #1: ---> 41e0866c116a Step #1: Step 6/8 : RUN git clone --depth 1 https://github.com/qlyoung/corpi Step #1: ---> Running in e04cbaf15c99 Step #1: Cloning into 'corpi'... Step #1: Removing intermediate container e04cbaf15c99 Step #1: ---> 0372ca13aad5 Step #1: Step 7/8 : COPY build.sh $SRC Step #1: ---> 2762d0a07d1b Step #1: Step 8/8 : WORKDIR $SRC/frr Step #1: ---> Running in f9de3840c9ea Step #1: Removing intermediate container f9de3840c9ea Step #1: ---> 1a0b5c2aee4c Step #1: Successfully built 1a0b5c2aee4c Step #1: Successfully tagged gcr.io/oss-fuzz/frr:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/frr Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileV4tMlP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/corpi/.git Step #2 - "srcmap": + GIT_DIR=/src/corpi Step #2 - "srcmap": + cd /src/corpi Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/qlyoung/corpi Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=de26a013ff7c9a88648aeea50e830167572a95a3 Step #2 - "srcmap": + jq_inplace /tmp/fileV4tMlP '."/src/corpi" = { type: "git", url: "https://github.com/qlyoung/corpi", rev: "de26a013ff7c9a88648aeea50e830167572a95a3" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileeUopkb Step #2 - "srcmap": + cat /tmp/fileV4tMlP Step #2 - "srcmap": + jq '."/src/corpi" = { type: "git", url: "https://github.com/qlyoung/corpi", rev: "de26a013ff7c9a88648aeea50e830167572a95a3" }' Step #2 - "srcmap": + mv /tmp/fileeUopkb /tmp/fileV4tMlP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/frr/.git Step #2 - "srcmap": + GIT_DIR=/src/frr Step #2 - "srcmap": + cd /src/frr Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/FRRouting/frr Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9b52e04d95ef6c326e2181d41042c16cc2afb87a Step #2 - "srcmap": + jq_inplace /tmp/fileV4tMlP '."/src/frr" = { type: "git", url: "https://github.com/FRRouting/frr", rev: "9b52e04d95ef6c326e2181d41042c16cc2afb87a" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file5p6EWF Step #2 - "srcmap": + cat /tmp/fileV4tMlP Step #2 - "srcmap": + jq '."/src/frr" = { type: "git", url: "https://github.com/FRRouting/frr", rev: "9b52e04d95ef6c326e2181d41042c16cc2afb87a" }' Step #2 - "srcmap": + mv /tmp/file5p6EWF /tmp/fileV4tMlP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libyang/.git Step #2 - "srcmap": + GIT_DIR=/src/libyang Step #2 - "srcmap": + cd /src/libyang Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/CESNET/libyang.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=7e5ea21030fe6632b6faad30c0de8d9669503773 Step #2 - "srcmap": + jq_inplace /tmp/fileV4tMlP '."/src/libyang" = { type: "git", url: "https://github.com/CESNET/libyang.git", rev: "7e5ea21030fe6632b6faad30c0de8d9669503773" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filevdDMHf Step #2 - "srcmap": + cat /tmp/fileV4tMlP Step #2 - "srcmap": + jq '."/src/libyang" = { type: "git", url: "https://github.com/CESNET/libyang.git", rev: "7e5ea21030fe6632b6faad30c0de8d9669503773" }' Step #2 - "srcmap": + mv /tmp/filevdDMHf /tmp/fileV4tMlP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileV4tMlP Step #2 - "srcmap": + rm /tmp/fileV4tMlP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/corpi": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/qlyoung/corpi", Step #2 - "srcmap": "rev": "de26a013ff7c9a88648aeea50e830167572a95a3" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/frr": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/FRRouting/frr", Step #2 - "srcmap": "rev": "9b52e04d95ef6c326e2181d41042c16cc2afb87a" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/libyang": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/CESNET/libyang.git", Step #2 - "srcmap": "rev": "7e5ea21030fe6632b6faad30c0de8d9669503773" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir -p /workspace/out/libfuzzer-coverage-x86_64/lib Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/libyang Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd build Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake -DBUILD_SHARED_LIBS=OFF -DENABLE_LYD_PRIV=ON -DCMAKE_INSTALL_PREFIX:PATH=/usr -D CMAKE_BUILD_TYPE:String=Release .. Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 15.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for vdprintf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for vdprintf - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for asprintf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for asprintf - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for vasprintf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for vasprintf - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getline Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getline - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strndup Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strndup - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strnstr Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strnstr - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strdupa Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strdupa - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strchrnul Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strchrnul - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for get_current_dir_name Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for get_current_dir_name - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pthread_mutex_timedlock Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pthread_mutex_timedlock - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdatomic.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdatomic.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for realpath Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for realpath - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for localtime_r Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for localtime_r - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gmtime_r Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gmtime_r - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timegm Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timegm - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strptime Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strptime - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mmap Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mmap - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setenv Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setenv - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Threads: TRUE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found PCRE2: /usr/lib/x86_64-linux-gnu/libpcre2-8.so (found suitable version "10.34", minimum required is "10.21") Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found PkgConfig: /usr/bin/pkg-config (found version "0.29.1") Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find Doxygen (missing: DOXYGEN_EXECUTABLE) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning: Step #3 - "compile-libfuzzer-coverage-x86_64": Manually-specified variables were not used by the project: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ENABLE_LYD_PRIV Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/libyang/build Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Building C object CMakeFiles/yangobj.dir/src/common.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building C object CMakeFiles/yangobj.dir/src/log.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building C object CMakeFiles/yangobj.dir/src/hash_table.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building C object CMakeFiles/yangobj.dir/src/set.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building C object CMakeFiles/yangobj.dir/src/dict.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Building C object CMakeFiles/yangobj.dir/src/path.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building C object CMakeFiles/yangobj.dir/src/diff.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building C object CMakeFiles/yangobj.dir/src/context.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building C object CMakeFiles/yangobj.dir/src/json.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building C object CMakeFiles/yangobj.dir/src/tree_data.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building C object CMakeFiles/yangobj.dir/src/tree_data_free.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building C object CMakeFiles/yangobj.dir/src/tree_data_common.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Building C object CMakeFiles/yangobj.dir/src/tree_data_hash.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building C object CMakeFiles/yangobj.dir/src/tree_data_new.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building C object CMakeFiles/yangobj.dir/src/parser_xml.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building C object CMakeFiles/yangobj.dir/src/parser_json.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building C object CMakeFiles/yangobj.dir/src/parser_lyb.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building C object CMakeFiles/yangobj.dir/src/out.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 19%] Building C object CMakeFiles/yangobj.dir/src/printer_data.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building C object CMakeFiles/yangobj.dir/src/printer_xml.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building C object CMakeFiles/yangobj.dir/src/printer_json.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building C object CMakeFiles/yangobj.dir/src/schema_compile.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object CMakeFiles/yangobj.dir/src/printer_lyb.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Building C object CMakeFiles/yangobj.dir/src/schema_compile_node.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object CMakeFiles/yangobj.dir/src/schema_compile_amend.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building C object CMakeFiles/yangobj.dir/src/schema_features.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building C object CMakeFiles/yangobj.dir/src/tree_schema_free.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building C object CMakeFiles/yangobj.dir/src/tree_schema.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building C object CMakeFiles/yangobj.dir/src/tree_schema_common.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building C object CMakeFiles/yangobj.dir/src/lyb.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building C object CMakeFiles/yangobj.dir/src/in.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building C object CMakeFiles/yangobj.dir/src/parser_common.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/common.c:269:18: warning: passing an object that undergoes default argument promotion to 'va_start' has undefined behavior [-Wvarargs] Step #3 - "compile-libfuzzer-coverage-x86_64": va_start(ap, bytes); Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/common.c:264:46: note: parameter of type 'uint8_t' (aka 'unsigned char') is declared here Step #3 - "compile-libfuzzer-coverage-x86_64": ly_utf8_and_equal(const char *input, uint8_t bytes, ...) Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/common.c:300:18: warning: passing an object that undergoes default argument promotion to 'va_start' has undefined behavior [-Wvarargs] Step #3 - "compile-libfuzzer-coverage-x86_64": va_start(ap, bytes); Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/common.c:295:41: note: parameter of type 'uint8_t' (aka 'unsigned char') is declared here Step #3 - "compile-libfuzzer-coverage-x86_64": ly_utf8_less(const char *input, uint8_t bytes, ...) Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/common.c:333:18: warning: passing an object that undergoes default argument promotion to 'va_start' has undefined behavior [-Wvarargs] Step #3 - "compile-libfuzzer-coverage-x86_64": va_start(ap, bytes); Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/common.c:328:44: note: parameter of type 'uint8_t' (aka 'unsigned char') is declared here Step #3 - "compile-libfuzzer-coverage-x86_64": ly_utf8_greater(const char *input, uint8_t bytes, ...) Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building C object CMakeFiles/yangobj.dir/src/parser_yang.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/tree_schema_common.c:1004:45: warning: format specifies type 'unsigned char' but the argument has type 'uint32_t' (aka 'unsigned int') [-Wformat] Step #3 - "compile-libfuzzer-coverage-x86_64": LOGVAL_PARSER(ctx, LY_VCODE_INCHAR, c); Step #3 - "compile-libfuzzer-coverage-x86_64":  ~~~~~~~~~~~~~~~ ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/tree_schema_internal.h:129:[ 34%] Building C object CMakeFiles/yangobj.dir/src/parser_yin.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 57: note: expanded from macro 'LOGVAL_PARSER' Step #3 - "compile-libfuzzer-coverage-x86_64": #define LOGVAL_PARSER(CTX, ...) LOGVAL(PARSER_CTX(CTX), __VA_ARGS__) Step #3 - "compile-libfuzzer-coverage-x86_64":  ^~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/src/common.h:202:45: note: expanded from macro 'LOGVAL' Step #3 - "compile-libfuzzer-coverage-x86_64": #define LOGVAL(CTX, ...) ly_vlog(CTX, NULL, __VA_ARGS__) Step #3 - "compile-libfuzzer-coverage-x86_64":  ^~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Building C object CMakeFiles/yangobj.dir/src/printer_schema.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building C object CMakeFiles/yangobj.dir/src/printer_yang.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object CMakeFiles/yangobj.dir/src/printer_yin.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building C object CMakeFiles/yangobj.dir/src/printer_tree.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Building C object CMakeFiles/yangobj.dir/src/plugins.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building C object CMakeFiles/yangobj.dir/src/plugins_types.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building C object CMakeFiles/yangobj.dir/src/plugins_exts.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object CMakeFiles/yangobj.dir/src/plugins_exts/metadata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building C object CMakeFiles/yangobj.dir/src/plugins_exts/nacm.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building C object CMakeFiles/yangobj.dir/src/plugins_exts/yangdata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building C object CMakeFiles/yangobj.dir/src/plugins_exts/schema_mount.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building C object CMakeFiles/yangobj.dir/src/plugins_exts/structure.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building C object CMakeFiles/yangobj.dir/src/xml.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Building C object CMakeFiles/yangobj.dir/src/xpath.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building C object CMakeFiles/yangobj.dir/src/validation.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 3 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/binary.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/bits.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/boolean.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/decimal64.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/empty.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/enumeration.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/identityref.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/instanceid.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 58%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/instanceid_keys.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/integer.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/leafref.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/string.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/union.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 63%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/ipv4_address.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/ipv4_address_no_zone.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/ipv6_address.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/ipv6_address_no_zone.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/ipv4_prefix.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/ipv6_prefix.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/date_and_time.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/hex_string.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/xpath1.0.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Building C object CMakeFiles/yangobj.dir/src/plugins_types/node_instanceid.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building C object CMakeFiles/yangobj.dir/compat/compat.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Built target yangobj Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Linking C shared library libyang.so Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Built target yang Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building C object tools/re/CMakeFiles/yangre.dir/main.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building C object tools/re/CMakeFiles/yangre.dir/__/__/compat/compat.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Building C object tools/lint/CMakeFiles/yanglint.dir/main_ni.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_add.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_clear.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_data.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_list.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_feature.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_load.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_print.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 86%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_searchpath.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_extdata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_help.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_verb.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Building C object tools/lint/CMakeFiles/yanglint.dir/cmd_debug.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building C object tools/lint/CMakeFiles/yanglint.dir/yl_opt.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building C object tools/lint/CMakeFiles/yanglint.dir/yl_schema_features.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Building C object tools/lint/CMakeFiles/yanglint.dir/common.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Building C object tools/lint/CMakeFiles/yanglint.dir/main.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Building C object tools/lint/CMakeFiles/yanglint.dir/completion.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building C object tools/lint/CMakeFiles/yanglint.dir/configuration.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building C object tools/lint/CMakeFiles/yanglint.dir/linenoise/linenoise.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Building C object tools/lint/CMakeFiles/yanglint.dir/__/__/compat/compat.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libyang/tools/lint/cmd_debug.c:134:7: warning: ISO C requires a translation unit to contain at least one declaration [-Wempty-translation-unit] Step #3 - "compile-libfuzzer-coverage-x86_64": #endif Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Linking C executable ../../yangre Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Built target yangre Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable ../../yanglint Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target yanglint Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": Consolidate compiler generated dependencies of target yangobj Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Built target yangobj Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Built target yang Step #3 - "compile-libfuzzer-coverage-x86_64": Consolidate compiler generated dependencies of target yanglint Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Built target yanglint Step #3 - "compile-libfuzzer-coverage-x86_64": Consolidate compiler generated dependencies of target yangre Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target yangre Step #3 - "compile-libfuzzer-coverage-x86_64": Install the project... Step #3 - "compile-libfuzzer-coverage-x86_64": -- Install configuration: "Release" Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/ietf-datastores@2018-02-14.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/ietf-yang-schema-mount@2019-01-14.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/ietf-yang-metadata@2016-08-05.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/yang@2022-06-16.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/ietf-inet-types@2013-07-15.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/ietf-yang-structure-ext@2020-06-17.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/ietf-yang-types@2013-07-15.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/yang/modules/libyang/ietf-yang-library@2019-01-04.yang Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/lib/x86_64-linux-gnu/libyang.so.2.41.0 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/lib/x86_64-linux-gnu/libyang.so.2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/lib/x86_64-linux-gnu/libyang.so Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/context.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/hash_table.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/dict.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/in.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/libyang.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/log.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/out.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/parser_data.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/parser_schema.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/plugins.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/plugins_exts.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/metadata.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/plugins_types.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/printer_data.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/printer_schema.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/set.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/tree.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/tree_data.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/tree_edit.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/tree_schema.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/version.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/include/libyang/config.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/lib/x86_64-linux-gnu/pkgconfig/libyang.pc Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/bin/yanglint Step #3 - "compile-libfuzzer-coverage-x86_64": -- Set runtime path of "/usr/bin/yanglint" to "" Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/man/man1/yanglint.1 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/bin/yangre Step #3 - "compile-libfuzzer-coverage-x86_64": -- Set runtime path of "/usr/bin/yangre" to "" Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /usr/share/man/man1/yangre.1 Step #3 - "compile-libfuzzer-coverage-x86_64": + export ASAN_OPTIONS=detect_leaks=0 Step #3 - "compile-libfuzzer-coverage-x86_64": + ASAN_OPTIONS=detect_leaks=0 Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_OVERRIDE_LLVMFuzzerTestOneInput' Step #3 - "compile-libfuzzer-coverage-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_OVERRIDE_LLVMFuzzerTestOneInput' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -DFUZZING_OVERRIDE_LLVMFuzzerTestOneInput' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -DFUZZING_OVERRIDE_LLVMFuzzerTestOneInput' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./bootstrap.sh Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'm4/ac'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ac/ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:176: installing 'm4/ac/compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:26: installing 'm4/ac/config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:26: installing 'm4/ac/config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:108: installing 'm4/ac/install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:108: installing 'm4/ac/missing' Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile.am: installing 'm4/ac/depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac: installing 'm4/ac/ylwrap' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing 'm4/ac/test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": pimd/subdir.am:171: warning: variable 'pimd_pimd6d_LDFLAGS' is defined but no program or Step #3 - "compile-libfuzzer-coverage-x86_64": pimd/subdir.am:171: library has 'pimd_pimd6d' as canonical name (possible typo) Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile.am:203: 'pimd/subdir.am' included from here Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --enable-libfuzzer --enable-static --enable-static-bin --sbindir=/src/bin Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for perl... /usr/bin/perl Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... /usr/bin/pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking pkg-config is at least version 0.9.0... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang++... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... (cached) /usr/bin/pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking pkg-config is at least version 0.9.0... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking minix/config.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking minix/config.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for minix/config.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether it is safe to define __EXTENSIONS__... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C99... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang supports -std=gnu11... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -fms-extensions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -fno-omit-frame-pointer... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -funwind-tables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wextra... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wformat-nonliteral... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wformat-security... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wswitch-enum... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wstrict-prototypes... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wmissing-prototypes... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wmissing-declarations... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wpointer-arith... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wbad-function-cast... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wwrite-strings... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wundef... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wno-unused-result... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wno-unused-parameter... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wno-missing-field-initializers... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -Wc++-compat... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -fsanitize=address,fuzzer... yes Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING - libFuzzer only enabled on supported daemons Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -fplugin=tools/gcc-plugins/frr-format.so... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang -std=gnu11 supports -fplugin=frr-format... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether linker supports __start/stop_section symbols... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if compiler needs -Werror to reject unknown flags... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for the pthreads library -lpthreads... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether pthreads work without any flags... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #3 - "compile-libfuzzer-coverage-x86_64": checking if more special flags are required for pthreads... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for PTHREAD_PRIO_INHERIT... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing pthread_condattr_setclock... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread_np.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread_setname_np... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread_set_name_np... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pthread_getthreadid_np... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang -std=gnu11... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang -std=gnu11 object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang -std=gnu11 supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang -std=gnu11 option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang -std=gnu11 PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang -std=gnu11 static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang -std=gnu11 supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang -std=gnu11 supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang -std=gnu11 linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether -lc should be explicitly linked in... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang++ option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ar supports D option... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ranlib supports D option... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking json-c/json.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking json-c/json.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for json-c/json.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for json_object_get in -ljson-c... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a Python interpreter with version >= 3... python Step #3 - "compile-libfuzzer-coverage-x86_64": checking for python... /usr/bin/python Step #3 - "compile-libfuzzer-coverage-x86_64": checking for python version... 3.8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for python platform... linux Step #3 - "compile-libfuzzer-coverage-x86_64": checking for python script directory... ${prefix}/lib/python3.8/site-packages Step #3 - "compile-libfuzzer-coverage-x86_64": checking for python extension module directory... ${exec_prefix}/lib/python3.8/site-packages Step #3 - "compile-libfuzzer-coverage-x86_64": checking gelf.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking gelf.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gelf.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for elf_memory in -lelf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for elf_getdata_rawchunk in -lelf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gelf_getnote in -lelf... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking python interpreter /usr/bin/python... /usr/bin/python (python3) Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether /usr/bin/python3.8-config is available... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether /usr/bin/python3.8-config provides a working build environment... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether /usr/bin/python module pytest is available... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether /usr/bin/python module sphinx is available... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether /usr/bin/python module sphinx is executable... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if zebra should be configurable to send Route Advertisements... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objcopy... objcopy Step #3 - "compile-libfuzzer-coverage-x86_64": checking for .interp value to use... /lib64/ld-linux-x86-64.so.2 Step #3 - "compile-libfuzzer-coverage-x86_64": checking stropts.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking stropts.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stropts.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ksym.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ksym.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/ksym.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/version.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking linux/version.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/version.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking asm/types.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking asm/types.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for asm/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking endian.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking endian.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for endian.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/endian.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/endian.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/endian.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdatomic.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdatomic.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdatomic.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether _Atomic qualifier works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for Linux futex() support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/if_var.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/in_var.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/if_dl.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/netopt.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inet/nd.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/ip_icmp.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/sysctl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/sockio.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/conf.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ucontext.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ucontext_t.uc_mcontext.uc_regs... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ucontext_t.uc_mcontext.regs... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ucontext_t.uc_mcontext.gregs... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking which operating system interface to use... Linux Step #3 - "compile-libfuzzer-coverage-x86_64": checking for special C compiler options needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcat... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strlcpy... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getgrouplist... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for openat... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unlinkat... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for posix_fallocate... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sendmmsg... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for explicit_bzero... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct mmsghdr.msg_hdr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for protoc... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for protoc-c... protoc-c Step #3 - "compile-libfuzzer-coverage-x86_64": checking for PROTOBUF_C (libprotobuf-c >= 1.1.0)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for readline in -lreadline... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for rl_clear_visible_line... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking readline/history.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking readline/history.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for readline/history.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for rl_completion_matches in -lreadline... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for append_history in -lreadline... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing pow... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ppoll... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pollts... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking asm-generic/unistd.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking asm-generic/unistd.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for asm-generic/unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether __NR_setns is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for setns... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/bpf.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking net/bpf.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/bpf.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/dlpi.h usability... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/dlpi.h presence... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/dlpi.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking zebra IS-IS I/O method... pfpacket Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct ip_mreqn.imr_ifindex... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/mroute.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for linux/mroute6.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/ip_mroute.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for RFC3678 protocol-independed API... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for net/if_media.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct if_data.ifi_link_state... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/tcp.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether TCP_MD5SIG is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for crypt in -lcrypt... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for res_init in -lresolv... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for CARES (libcares)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct utsname.domainname... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet6/in6.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/in6_var.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet6/in6_var.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet6/nd6.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for LIBYANG (libyang >= 2.0.0)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct lyd_node.priv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ZEROMQ (libzmq >= 4.0.0)... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pimd OS support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pim6d OS support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for VRRP OS support... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the RTR Library is compiled with SSH... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing dlopen... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking link.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking link.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for link.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlinfo(RTLD_DI_ORIGIN)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlinfo(RTLD_DI_LINKMAP)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sockaddr_dl... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct vifctl... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct mfcctl... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sioc_sg_req... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vifi_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sioc_vif_req... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct igmpmsg... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct ifaliasreq... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct if6_aliasreq... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct in6_aliasreq... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct nd_opt_adv_interval... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct nd_opt_homeagent_info... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct nd_opt_adv_interval... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct nd_opt_rdnss... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct nd_opt_dnssl... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sockaddr.sa_len... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sockaddr_in.sin_len... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sockaddr_un.sun_len... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct sockaddr_dl.sdl_len... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct if6_aliasreq.ifra_lifetime... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct nd_opt_adv_interval.nd_opt_ai_type... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct in_pktinfo... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for struct icmphdr... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for IP_PKTINFO... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for IP_RECVDSTADDR... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for IP_RECVIF... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for SO_BINDANY... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for IP_FREEBIND... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether be32enc is declared... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether be32dec is declared... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether CLOCK_MONOTONIC is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clock_gettime in -lrt... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether CLOCK_THREAD_CPUTIME_ID is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing clock_nanosleep... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for flex... flex Step #3 - "compile-libfuzzer-coverage-x86_64": checking lex output file root... lex.yy Step #3 - "compile-libfuzzer-coverage-x86_64": checking lex library... -lfl Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether yytext is a pointer... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking version of flex... 2.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bison... bison -y Step #3 - "compile-libfuzzer-coverage-x86_64": checking version of bison... 3.5.1 - 3.3 or newer Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether prctl PR_SET_KEEPCAPS is available... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/capability.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/capability.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/capability.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for cap_init in -lcap... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for UNWIND (libunwind)... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking unwind.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking unwind.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unwind.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing unw_getcontext... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking execinfo.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking execinfo.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for execinfo.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing backtrace... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for malloc.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for malloc_np.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for malloc/malloc.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether mallinfo is available... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether mallinfo2 is available... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether malloc_usable_size is available... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking directory to use for state file... /var/run Step #3 - "compile-libfuzzer-coverage-x86_64": checking for CU_initialize_registry in -lcunit... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for valgrind... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.version Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating redhat/frr.spec Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating alpine/APKBUILD Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating snapcraft/snapcraft.yaml Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating lib/version.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tests/lib/cli/test_cli.refout Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/mgmtd.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/bgpd.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/ospf6d.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/ospfd.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/ripd.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/ripngd.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/zebra.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating pkgsrc/eigrpd.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tools/frr Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tools/watchfrr.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tools/frrinit.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tools/frrcommon.sh Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tools/frr.service Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tools/frr@.service Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": FRRouting configuration Step #3 - "compile-libfuzzer-coverage-x86_64": ------------------------------ Step #3 - "compile-libfuzzer-coverage-x86_64": FRR version : 9.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": host operating system : linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": source code location : . Step #3 - "compile-libfuzzer-coverage-x86_64": compiler : clang -std=gnu11 Step #3 - "compile-libfuzzer-coverage-x86_64": compiler flags : -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_OVERRIDE_LLVMFuzzerTestOneInput -fms-extensions -fno-omit-frame-pointer -funwind-tables -Wextra -Wformat-nonliteral -Wformat-security -Wswitch-enum -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -Wpointer-arith -Wbad-function-cast -Wwrite-strings -Wundef -Wno-unused-result -Wno-unused-parameter -Wno-missing-field-initializers -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-coverage-x86_64": make : make Step #3 - "compile-libfuzzer-coverage-x86_64": linker flags : -g -fsanitize=fuzzer-no-link -ljson-c -lrt -lcap -lreadline Step #3 - "compile-libfuzzer-coverage-x86_64": state file directory : /var/run Step #3 - "compile-libfuzzer-coverage-x86_64": config file directory : /usr/local/etc Step #3 - "compile-libfuzzer-coverage-x86_64": module directory : /usr/local/lib/frr/modules Step #3 - "compile-libfuzzer-coverage-x86_64": script directory : /usr/local/etc/scripts Step #3 - "compile-libfuzzer-coverage-x86_64": user to run as : frr Step #3 - "compile-libfuzzer-coverage-x86_64": group to run as : frr Step #3 - "compile-libfuzzer-coverage-x86_64": group for vty sockets : Step #3 - "compile-libfuzzer-coverage-x86_64": config file mask : 0600 Step #3 - "compile-libfuzzer-coverage-x86_64": log file mask : 0600 Step #3 - "compile-libfuzzer-coverage-x86_64": zebra protobuf enabled : no Step #3 - "compile-libfuzzer-coverage-x86_64": vici socket path : /var/run/charon.vici Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": The above user and group must have read/write access to the state file Step #3 - "compile-libfuzzer-coverage-x86_64": directory and to the config files in the config file directory. Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: pytest is missing, unit tests cannot be performed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": true Step #3 - "compile-libfuzzer-coverage-x86_64": PROTOC_C lib/mgmt.pb-c.c Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/perl ./lib/route_types.pl --enabled babeld --enabled bfdd --enabled bgpd --enabled bgpd-vnc --enabled eigrpd --enabled isisd --enabled fabricd --enabled ldpd --enabled nhrpd --enabled ospfd --enabled ospf6d --enabled pbrd --enabled pimd --enabled ripd --enabled ripngd --enabled zebra < ./lib/route_types.txt > lib/route_types.h Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/perl ./vtysh/daemons.pl zebra mgmtd bgpd ripd ripngd ospfd ospf6d isisd fabricd nhrpd ldpd babeld eigrpd pimd pim6d pbrd staticd bfdd vrrpd pathd > vtysh/vtysh_daemons.h Step #3 - "compile-libfuzzer-coverage-x86_64": GEN lib/mgmt.pb-c.c Step #3 - "compile-libfuzzer-coverage-x86_64": make all-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": LEX lib/command_lex.c Step #3 - "compile-libfuzzer-coverage-x86_64": YACC lib/command_parse.c Step #3 - "compile-libfuzzer-coverage-x86_64": LEX lib/defun_lex.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-affinity-map.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-filter.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-if-rmap.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-interface.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-route-map.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-route-types.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-vrf.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-routing.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-nexthop.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/ietf/ietf-routing-types.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/ietf/ietf-interfaces.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/ietf/ietf-bgp-types.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-module-translator.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-zebra.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-zebra-route-map.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-staticd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bfdd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-types.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-common-structure.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-common.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-common-multiprotocol.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-neighbor.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-peer-group.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-bmp.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-rpki.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-filter.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-deviations-bgp-datacenter.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-bgp-route-map.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_advertise.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_aspath.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_attr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_addpath.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_attr_evpn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_clist.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_community.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_community_alias.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_conditional_adv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_damp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_dump.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_ecommunity.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_encap_tlv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_evpn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_evpn_mh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_filter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_flowspec.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_flowspec_util.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_fsm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_io.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_flowspec_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_keepalives.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_label.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_lcommunity.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_mac.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_mpath.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_network.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_mplsvpn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_nht.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_open.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_pbr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_rd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_regex.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_routemap_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_routemap_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_script.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_table.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_updgrp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_updgrp_adv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_updgrp_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_vpn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgpd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_trace.o Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-ripd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bfdd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-ripngd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-ospf-route-map.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-ospf6-route-map.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_abr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_routemap_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_routemap_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_flood.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_intra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_lsdb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_message.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_neighbor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_network.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_proto.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_spf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6d.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_auth_trailer.o Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-isisd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_affinitymap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_adjacency.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_circuit.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_csm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_dr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_dynhn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_events.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_flags.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_ldp_sync.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_lfa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_lsp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_misc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_mt.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_pdu.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_pdu_counter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_redist.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_route.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_spf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_sr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_flex_algo.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_te.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_tlvs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_tx_queue.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isisd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/iso_checksum.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/fabricd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_nb_notifications.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_nb_state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/fabricd-isis_bpf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/fabricd-isis_dlpi.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/fabricd-isis_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/fabricd-isis_pfpacket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_affinitymap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_adjacency.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_circuit.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_csm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_dr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_dynhn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_events.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_flags.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_ldp_sync.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_lfa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_lsp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_misc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_mt.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_pdu.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_pdu_counter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_redist.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_route.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_spf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_sr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_flex_algo.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_te.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_tlvs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_tx_queue.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isisd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-iso_checksum.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-fabricd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/libfabric_a-isis_vty_fabricd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/libfrrcares_la-resolver.lo Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-eigrpd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_addr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_assert.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_bsm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_cmd_common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_hello.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_iface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_ifchannel.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_instance.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_int.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_join.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_jp_agg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_macro.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_mroute.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_msg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_neighbor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_nht.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_oil.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_pim.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_rp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_rpf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_sock.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_ssm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_ssmpingd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_static.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_str.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_tib.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_time.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_tlv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_upstream.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_util.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_zlookup.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_vxlan.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_register.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pimd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_igmp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_igmp_mtrace.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_igmp_stats.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_igmpv2.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_igmpv3.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_mlag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_msdp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_msdp_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_msdp_socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_signals.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_zpthread.o Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-pim.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-pim-rp.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-gmp.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_addr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_assert.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_bsm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_cmd_common.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_hello.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_iface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_ifchannel.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_instance.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_int.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_join.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_jp_agg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_macro.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_mroute.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_msg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_neighbor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_nht.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_oil.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_pim.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_rp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_rpf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_sock.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_ssm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_ssmpingd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_static.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_str.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_tib.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_time.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_tlv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_upstream.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_util.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_zlookup.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_vxlan.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim_register.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pimd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim6_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/pimd_pim6d-frr-pim.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/pimd_pim6d-frr-pim-rp.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/pimd_pim6d-frr-gmp.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-staticd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_nht.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_routes.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_vrf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-vrrpd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": GEN yang/frr-pathd.yang.c Step #3 - "compile-libfuzzer-coverage-x86_64": PROTOC_C qpb/qpb.pb-c.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/irdp_interface.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/irdp_main.lo Step #3 - "compile-libfuzzer-coverage-x86_64": GEN qpb/qpb.pb-c.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/irdp_packet.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mlag_private.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/dplane_fpm_nl.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd_pcep_la-path_pcep.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd_pcep_la-path_pcep_controller.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd_pcep_la-path_pcep_debug.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd_pcep_la-path_pcep_lib.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd_pcep_la-path_pcep_config.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd_pcep_la-path_pcep_pcc.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/grammar_sandbox_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_btoa-bgp_btoa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfclient/ospfclient.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/test_igmpv3_join-test_igmpv3_join.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/pcep_pcc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tools/ssd-start-stop-daemon.o Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pceplib/libsocket_comm_mock.la Step #3 - "compile-libfuzzer-coverage-x86_64": SPHINX doc/user/_build/.doctrees/environment.pickle Step #3 - "compile-libfuzzer-coverage-x86_64": SPHINX doc/manpages/_build/.doctrees/environment.pickle Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/mtracebis-mtracebis.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/mtracebis-mtracebis_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/admin_group.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/mtracebis-mtracebis_routeget.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/affinitymap.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-jhash.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-clippy.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-command_graph.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-command_py.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-defun_lex.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-elf_py.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-graph.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-libfrr_trace.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-typesafe.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-vector.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/affinitymap_northbound.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/agg_table.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/atomlist.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/asn.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/base64.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/bfd.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/buffer.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/checksum.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/command.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/command_graph.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/command_lex.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/command_match.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/command_parse.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/cspf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/csv.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/darr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/debug.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/defaults.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/distribute.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/explicit_bzero.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/ferr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/filter.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/filter_nb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/flex_algo.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/frrcu.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/frrlua.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/frrscript.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/frr_pthread.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/frrstr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/grammar_sandbox.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/graph.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/hash.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/hook.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/id_alloc.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/imsg-buffer.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/imsg.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/iso.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/jhash.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/json.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/keychain.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/ldp_sync.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/lib_errors.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/lib_vty.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/libfrr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/libfrr_trace.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/linklist.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/link_state.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/log.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/log_filter.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/md5.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/memory.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/mgmt_msg.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/mlag.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/module.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/mpls.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/srv6.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/network.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/nexthop.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/netns_linux.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/netns_other.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/northbound.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/northbound_db.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/ntop.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/openbsd-tree.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/pid_output.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/prefix.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/privs.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/ptm_lib.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/pullwr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/qobj.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/ringbuf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/routemap_northbound.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/sbuf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/seqlock.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/sha256.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/sigevent.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/skiplist.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/sockopt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/sockunion.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/spf_backoff.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/segment_routing.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/srcdest_table.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/stream.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/strformat.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/strlcat.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/strlcpy.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/systemd.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/table.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/termtable.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/typerb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/typesafe.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/vector.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/vrf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/wheel.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/workqueue.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/xref.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/yang_translator.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/yang_wrappers.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/zclient.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/zlog.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/zlog_5424.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/zlog_live.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/zlog_targets.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/printf/printf-pos.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/printf/vfprintf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/printf/glue.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/routing_nb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/routing_nb_config.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/tc.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/mgmt.pb-c.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-affinity-map.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-filter.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-if-rmap.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-interface.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-route-map.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-route-types.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-vrf.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-routing.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-nexthop.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/ietf/ietf-routing-types.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/ietf/ietf-interfaces.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/ietf/ietf-bgp-types.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-module-translator.yang.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC vtysh/vtysh_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vtysh/vtysh_user.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vtysh/vtysh_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/connected.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/if_ioctl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/if_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/if_socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/if_sysctl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/ioctl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/ipforward_proc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/ipforward_sysctl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/kernel_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/kernel_socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/label_manager.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/netconf_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/redistribute.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/router-id.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/rt_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/rt_socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/rtread_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/rtread_sysctl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/rule_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/rule_socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/table_manager.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/tc_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/tc_socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zapi_msg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_affinitymap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_dplane.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_gr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_l2.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_l2_bridge_if.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_evpn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_evpn_mac.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_evpn_neigh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mlag.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mpls.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mpls_netlink.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mpls_openbsd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mpls_null.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mpls_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_srv6.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mroute.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_nb_rpcs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_nb_state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_netns_id.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_netns_notify.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_nhg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_ns.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_opaque.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_pbr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_ptm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_ptm_redistribute.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_pw.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_router.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_rib.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_rnh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_routemap_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_routemap_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_script.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_srte.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_tc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_trace.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_vxlan.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_vxlan_if.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_neigh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zserv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/debug_nl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-zebra.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-zebra-route-map.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC watchfrr/watchfrr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC watchfrr/watchfrr_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmtd-mgmt_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/mgmtd_mgmtd-frr-staticd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/mgmtd_mgmtd-frr-bfdd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt_ds.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt_be_adapter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt_fe_adapter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt_history.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt_memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt_txn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-types.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-common-structure.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-common.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-common-multiprotocol.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-neighbor.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-peer-group.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-bmp.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-rpki.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-deviations-bgp-datacenter.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-filter.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-bgp-route-map.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/bgp_rfapi_cfg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_import.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_ap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_descriptor_rfp_utils.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_encap_tlv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_nve_addr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_monitor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_rib.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/rfapi_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/vnc_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/vnc_export_bgp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/vnc_export_table.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/vnc_import_bgp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfapi/vnc_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfp-example/librfp/rfp_example.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_offset.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_nb_rpcs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_nb_notifications.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_nb_state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_peer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/ripd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-ripd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/frr/doc/user/pbr.rst:31: WARNING: duplicate label nexthop-groups, other instance in /src/frr/doc/user/nexthop_groups.rst Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_nexthop.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_offset.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_nb_rpcs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_nb_state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_peer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_route.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripngd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-ripngd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-ospf-route-map.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_abr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_api.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_apiserver.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_asbr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_ase.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_dump_api.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_ext.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_flood.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_ia.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_ism.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_lsa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_lsdb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_neighbor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_network.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_nsm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_opaque.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_ri.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_route.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_routemap_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_routemap_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_spf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_ti_lfa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_sr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_te.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_gr_helper.o Step #3 - "compile-libfuzzer-coverage-x86_64": AR ospfd/libfrrospfclient.a Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-ospf6-route-map.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_bpf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_dlpi.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_pfpacket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-isisd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": AR isisd/libfabric.a Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/linux.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/netlink_arp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_cache.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_event.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_nhs.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_peer.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_multicast.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_route.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_shortcut.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_vc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/nhrp_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/reqid.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/vici.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/zbuf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC nhrpd/znl.o Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD lib/libfrrcares.la Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/ldpd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/accept.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/address.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/adjacency.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/control.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/hello.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/init.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/keepalive.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/l2vpn.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/labelmapping.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/lde.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/lde_lib.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/ldp_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/ldp_vty_conf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/ldp_vty_exec.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/ldp_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/ldpe.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/log.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/logmsg.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/neighbor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/notification.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/pfkey.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/rlfa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/socket.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/util.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/babel_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/babel_filter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/babel_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/babel_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/kernel.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/message.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/neighbour.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/net.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/resend.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/route.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/source.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/util.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/xroute.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_dump.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_filter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_fsm.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_hello.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_metric.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_neighbor.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_network.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_northbound.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_query.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_reply.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_siaquery.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_siareply.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_snmp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_topology.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_update.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_vrf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrpd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-eigrpd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/pimd_pimd-frr-pim.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/pimd_pimd-frr-pim-rp.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/pimd_pimd-frr-gmp.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_map.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_memory.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_nht.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_vrf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfdd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfdd_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfdd_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfdd_nb_state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfd_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/control.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/dplane.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/event.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/ptm_adapter.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_arp.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_ndisc.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_northbound.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_packet.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-vrrpd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_main.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC yang/frr-pathd.yang.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_errors.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_nb.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_nb_config.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_nb_state.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_zebra.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC qpb/libfrr_pb_la-qpb.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC qpb/libfrr_pb_la-qpb_allocator.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC qpb/libfrr_pb_la-qpb.pb-c.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfclient/ospf_apiclient.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD zebra/zebra_irdp.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD zebra/zebra_cumulus_mlag.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD zebra/dplane_fpm_nl.la Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_messages.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_objects.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_tlvs.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_tools.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_messages_encoding.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_objects_encoding.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_tlvs_encoding.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_msg_object_error_types.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_pcc_api.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_session_logic.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_session_logic_loop.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_session_logic_states.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_session_logic_counters.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_socket_comm_loop.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_socket_comm.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_timers_event_loop.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_timers.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_utils_counters.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_utils_double_linked_list.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_utils_logging.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_utils_memory.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_utils_ordered_list.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pceplib/libpcep_pcc_la-pcep_utils_queue.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tools/permutations.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tools/gen_northbound_callbacks.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC tools/gen_yang_deviations.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/rfp-example/rfptest/rfptest-rfptest.o Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD tools/ssd Step #3 - "compile-libfuzzer-coverage-x86_64": SPHINX doc/manpages/_build/man/man.stamp Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-command_lex.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/clippy-command_parse.o Step #3 - "compile-libfuzzer-coverage-x86_64": AR bgpd/rfp-example/librfp/librfp.a Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD qpb/libfrr_pb.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD lib/clippy Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pceplib/libpcep_pcc.la Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/affinitymap_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/filter_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/if_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/if_rmap_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/log_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/mgmt_be_client_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/mgmt_fe_client_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/nexthop_group_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/northbound_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/plist_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/routemap_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/event_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/routemap_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY lib/zlog_5424_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY vtysh/vtysh_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/interface_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/debug_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/rtadv_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/zebra_mlag_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/zebra_srv6_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/zebra_vrf_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/zebra_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/zebra_evpn_mh_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY watchfrr/watchfrr_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY mgmtd/mgmt_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY zebra/zebra_routemap_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY staticd/static_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_debug_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_labelpool_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_evpn_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_nexthop_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_route_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_routemap_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ripd/rip_bfd_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ripd/rip_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ripngd/ripng_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospfd/ospf_dump_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospfd/ospf_gr_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospfd/ospf_ldp_sync_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospfd/ospf_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_nssa_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_area_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_gr_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_gr_helper_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_asbr_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_interface_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_lsa_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_route_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ospf6d/ospf6_top_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY isisd/isis_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY babeld/babel_interface_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY ldpd/ldp_vty_cmds_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY babeld/babeld_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY eigrpd/eigrp_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY eigrpd/eigrp_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pimd/pim_cmd_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pimd/pim6_mld_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pimd/pim6_cmd_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pbrd/pbr_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pbrd/pbr_debug_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/static_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bfdd/bfdd_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bfdd/bfdd_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY vrrpd/vrrp_vty_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pathd/path_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pathd/path_ted_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO qpb/libfrr_pb.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO lib/libfrrcares.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO zebra/zebra_irdp.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO zebra/zebra_cumulus_mlag.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO zebra/dplane_fpm_nl.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY bgpd/bgp_bmp_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CLIPPY pathd/path_pcep_cli_clippy.c Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/affinitymap_cli.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/filter_cli.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/if_rmap.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/if.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/log_vty.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/mgmt_be_client.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/mgmt_fe_client.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/nexthop_group.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/northbound_cli.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/plist.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/routemap.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/event.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/vty.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/routemap_cli.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC lib/zlog_5424_cli.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC vtysh/vtysh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/rtadv.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_mlag_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_srv6_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_vrf.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC zebra/zebra_evpn_mh.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC watchfrr/watchfrr_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC mgmtd/mgmt_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC staticd/mgmtd_libmgmt_be_nb_la-static_vty.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_evpn_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_labelpool.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_routemap.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_nexthop.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_bfd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripd/rip_cli.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ripngd/ripng_cli.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_dump.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_gr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_ldp_sync.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospfd/ospf_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_nssa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_area.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_asbr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_gr.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_gr_helper.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_lsa.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_route.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ospf6d/ospf6_top.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC isisd/isis_cli.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC ldpd/ldp_vty_cmds.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/babel_interface.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC babeld/babeld.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_cli.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC eigrpd/eigrp_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pimd-pim_cmd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim6_mld.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pimd/pim6d-pim6_cmd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pbrd/pbr_debug.o Step #3 - "compile-libfuzzer-coverage-x86_64": AR staticd/libstatic.a Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfdd_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bfdd/bfdd_cli.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC vrrpd/vrrp_vty.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_cli.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/path_ted.o Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_bmp.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC pathd/pathd_pcep_la-path_pcep_cli.lo Step #3 - "compile-libfuzzer-coverage-x86_64": SPHINX doc/user/_build/texinfo/frr.texi Step #3 - "compile-libfuzzer-coverage-x86_64": AR mgmtd/libmgmtd.a Step #3 - "compile-libfuzzer-coverage-x86_64": CC bgpd/bgp_route.o Step #3 - "compile-libfuzzer-coverage-x86_64": AR bfdd/libbfd.a Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD lib/libfrr.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD mgmtd/libmgmt_be_nb.la Step #3 - "compile-libfuzzer-coverage-x86_64": AR ospf6d/libospf6.a Step #3 - "compile-libfuzzer-coverage-x86_64": AR ldpd/libldp.a Step #3 - "compile-libfuzzer-coverage-x86_64": AR pathd/libpath.a Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO mgmtd/libmgmt_be_nb.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": AR pbrd/libpbr.a Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pathd/pathd_pcep.la Step #3 - "compile-libfuzzer-coverage-x86_64": AR isisd/libisis.a Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO pathd/pathd_pcep.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": MAKEINFO doc/user/_build/texinfo/frr.info Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD bgpd/bgpd_bmp.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pimd/mtracebis Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD zebra/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD watchfrr/watchfrr Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD mgmtd/mgmtd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD ripd/ripd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD ripngd/ripngd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD ospf6d/ospf6d Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD isisd/isisd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD isisd/fabricd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD ldpd/ldpd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD nhrpd/nhrpd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD babeld/babeld Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD eigrpd/eigrpd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pimd/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pimd/pim6d Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO lib/libfrr.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pbrd/pbrd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD staticd/staticd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD ospfclient/libfrrospfapiclient.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD bfdd/bfdd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD vrrpd/vrrpd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pathd/pathd Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO bgpd/bgpd_bmp.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD lib/grammar_sandbox Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD tools/permutations Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD tools/gen_yang_deviations Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD tools/gen_northbound_callbacks Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD bgpd/rfp-example/rfptest/rfptest Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pimd/test_igmpv3_join Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD pceplib/pcep_pcc Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO ospfclient/libfrrospfapiclient.la.xref Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD ospfclient/ospfclient Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO vrrpd/vrrpd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": AR ospfd/libfrrospf.a Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD ospfd/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO mgmtd/mgmtd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO watchfrr/watchfrr.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO nhrpd/nhrpd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO pathd/pathd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO staticd/staticd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO pbrd/pbrd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO bfdd/bfdd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO babeld/babeld.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO ripngd/ripngd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO ripd/ripd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO eigrpd/eigrpd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO ospf6d/ospf6d.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO isisd/isisd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO ldpd/ldpd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO isisd/fabricd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO pimd/pim6d.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO pimd/pimd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": AR bgpd/libbgp.a Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO ospfd/ospfd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO zebra/zebra.xref Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD bgpd/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD bgpd/bgp_btoa Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO bgpd/bgpd.xref Step #3 - "compile-libfuzzer-coverage-x86_64": XRELFO frr.xref Step #3 - "compile-libfuzzer-coverage-x86_64": CC vtysh/vtysh_cmd.o Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD vtysh/vtysh Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": true Step #3 - "compile-libfuzzer-coverage-x86_64": make install-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c lib/libfrr.la lib/libfrrcares.la qpb/libfrr_pb.la mgmtd/libmgmt_be_nb.la ospfclient/libfrrospfapiclient.la '/usr/local/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c lib/.libs/libfrr.so.0.0.0 /usr/local/lib/libfrr.so.0.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrr.so.0.0.0 libfrr.so.0 || { rm -f libfrr.so.0 && ln -s libfrr.so.0.0.0 libfrr.so.0; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrr.so.0.0.0 libfrr.so || { rm -f libfrr.so && ln -s libfrr.so.0.0.0 libfrr.so; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c lib/.libs/libfrr.lai /usr/local/lib/libfrr.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c lib/.libs/libfrrcares.so.0.0.0 /usr/local/lib/libfrrcares.so.0.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrrcares.so.0.0.0 libfrrcares.so.0 || { rm -f libfrrcares.so.0 && ln -s libfrrcares.so.0.0.0 libfrrcares.so.0; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrrcares.so.0.0.0 libfrrcares.so || { rm -f libfrrcares.so && ln -s libfrrcares.so.0.0.0 libfrrcares.so; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c lib/.libs/libfrrcares.lai /usr/local/lib/libfrrcares.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c qpb/.libs/libfrr_pb.so.0.0.0 /usr/local/lib/libfrr_pb.so.0.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrr_pb.so.0.0.0 libfrr_pb.so.0 || { rm -f libfrr_pb.so.0 && ln -s libfrr_pb.so.0.0.0 libfrr_pb.so.0; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrr_pb.so.0.0.0 libfrr_pb.so || { rm -f libfrr_pb.so && ln -s libfrr_pb.so.0.0.0 libfrr_pb.so; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c qpb/.libs/libfrr_pb.lai /usr/local/lib/libfrr_pb.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c mgmtd/.libs/libmgmt_be_nb.so.0.0.0 /usr/local/lib/libmgmt_be_nb.so.0.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libmgmt_be_nb.so.0.0.0 libmgmt_be_nb.so.0 || { rm -f libmgmt_be_nb.so.0 && ln -s libmgmt_be_nb.so.0.0.0 libmgmt_be_nb.so.0; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libmgmt_be_nb.so.0.0.0 libmgmt_be_nb.so || { rm -f libmgmt_be_nb.so && ln -s libmgmt_be_nb.so.0.0.0 libmgmt_be_nb.so; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c mgmtd/.libs/libmgmt_be_nb.lai /usr/local/lib/libmgmt_be_nb.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /src/frr; /bin/bash "/src/frr/libtool" --silent --tag CC --mode=relink clang -std=gnu11 -fms-extensions -fno-omit-frame-pointer -funwind-tables -Wextra -Wformat-nonliteral -Wformat-security -Wswitch-enum -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -Wpointer-arith -Wbad-function-cast -Wwrite-strings -Wundef -Wno-unused-result -Wno-unused-parameter -Wno-missing-field-initializers -fsanitize=fuzzer-no-link -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_OVERRIDE_LLVMFuzzerTestOneInput -export-dynamic -fsanitize=fuzzer-no-link -version-info 0:0:0 -g -o ospfclient/libfrrospfapiclient.la -rpath /usr/local/lib ospfclient/ospf_apiclient.lo lib/libfrr.la -ljson-c -lrt ) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ospfclient/.libs/libfrrospfapiclient.so.0.0.0T /usr/local/lib/libfrrospfapiclient.so.0.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrrospfapiclient.so.0.0.0 libfrrospfapiclient.so.0 || { rm -f libfrrospfapiclient.so.0 && ln -s libfrrospfapiclient.so.0.0.0 libfrrospfapiclient.so.0; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /usr/local/lib && { ln -s -f libfrrospfapiclient.so.0.0.0 libfrrospfapiclient.so || { rm -f libfrrospfapiclient.so && ln -s libfrrospfapiclient.so.0.0.0 libfrrospfapiclient.so; }; }) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ospfclient/.libs/libfrrospfapiclient.lai /usr/local/lib/libfrrospfapiclient.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c lib/.libs/libfrr.a /usr/local/lib/libfrr.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libfrr.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib -D /usr/local/lib/libfrr.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c lib/.libs/libfrrcares.a /usr/local/lib/libfrrcares.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libfrrcares.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib -D /usr/local/lib/libfrrcares.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c qpb/.libs/libfrr_pb.a /usr/local/lib/libfrr_pb.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libfrr_pb.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib -D /usr/local/lib/libfrr_pb.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c mgmtd/.libs/libmgmt_be_nb.a /usr/local/lib/libmgmt_be_nb.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libmgmt_be_nb.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib -D /usr/local/lib/libmgmt_be_nb.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ospfclient/.libs/libfrrospfapiclient.a /usr/local/lib/libfrrospfapiclient.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /usr/local/lib/libfrrospfapiclient.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib -D /usr/local/lib/libfrrospfapiclient.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/sbin" ldconfig -n /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR' Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following: Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during execution Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during linking Step #3 - "compile-libfuzzer-coverage-x86_64": - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #3 - "compile-libfuzzer-coverage-x86_64": - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages. Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c pimd/mtracebis vtysh/vtysh '/usr/local/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pimd/mtracebis /usr/local/bin/mtracebis Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c vtysh/vtysh /usr/local/bin/vtysh Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c zebra/zebra watchfrr/watchfrr tools/ssd mgmtd/mgmtd bgpd/bgpd ripd/ripd ripngd/ripngd ospfd/ospfd ospf6d/ospf6d isisd/isisd isisd/fabricd nhrpd/nhrpd ldpd/ldpd babeld/babeld eigrpd/eigrpd pimd/pimd pimd/pim6d pbrd/pbrd staticd/staticd bfdd/bfdd vrrpd/vrrpd pathd/pathd '/src/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c zebra/zebra /src/bin/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c watchfrr/watchfrr /src/bin/watchfrr Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c tools/ssd /src/bin/ssd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c mgmtd/mgmtd /src/bin/mgmtd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c bgpd/bgpd /src/bin/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ripd/ripd /src/bin/ripd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ripngd/ripngd /src/bin/ripngd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ospfd/ospfd /src/bin/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ospf6d/ospf6d /src/bin/ospf6d Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c isisd/isisd /src/bin/isisd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c isisd/fabricd /src/bin/fabricd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c nhrpd/nhrpd /src/bin/nhrpd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c ldpd/ldpd /src/bin/ldpd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c babeld/babeld /src/bin/babeld Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c eigrpd/eigrpd /src/bin/eigrpd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pimd/pimd /src/bin/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pimd/pim6d /src/bin/pim6d Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pbrd/pbrd /src/bin/pbrd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c staticd/staticd /src/bin/staticd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c bfdd/bfdd /src/bin/bfdd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c vrrpd/.libs/vrrpd /src/bin/vrrpd Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pathd/pathd /src/bin/pathd Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c tools/frr-reload tools/frr-reload.py tools/frr tools/frrcommon.sh tools/frrinit.sh tools/generate_support_bundle.py tools/frr_babeltrace.py tools/watchfrr.sh ospfclient/ospfclient.py '/src/bin' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/frr/bfdd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 bfdd/bfddp_packet.h '/usr/local/include/frr/bfdd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p "/usr/local/share/info" Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 "doc/user/_build/texinfo/frr.info" "/usr/local/share/info" Step #3 - "compile-libfuzzer-coverage-x86_64": [ -z "" ] && --info-dir="/usr/local/share/info" "doc/user/_build/texinfo/frr.info" || true Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash: --info-dir=/usr/local/share/info: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/yang' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 yang/frr-affinity-map.yang yang/frr-filter.yang yang/frr-module-translator.yang yang/frr-nexthop.yang yang/frr-test-module.yang yang/frr-if-rmap.yang yang/frr-interface.yang yang/frr-route-map.yang yang/frr-zebra-route-map.yang yang/frr-ospf-route-map.yang yang/frr-ospf6-route-map.yang yang/frr-bgp-filter.yang yang/frr-bgp-route-map.yang yang/frr-vrf.yang yang/frr-route-types.yang yang/frr-routing.yang yang/ietf/ietf-routing-types.yang yang/ietf/ietf-interfaces.yang yang/ietf/ietf-bgp-types.yang yang/frr-bfdd.yang yang/frr-eigrpd.yang yang/frr-ripd.yang yang/frr-ripngd.yang yang/frr-isisd.yang yang/frr-vrrpd.yang yang/frr-staticd.yang yang/frr-zebra.yang yang/frr-gmp.yang yang/frr-pim.yang yang/frr-pim-rp.yang yang/frr-bgp-common-structure.yang yang/frr-bgp-common.yang yang/frr-bgp-common-multiprotocol.yang yang/frr-bgp-neighbor.yang yang/frr-bgp-peer-group.yang yang/frr-deviations-bgp-datacenter.yang yang/frr-bgp-rpki.yang yang/frr-bgp-bmp.yang yang/frr-bgp-types.yang yang/frr-bgp.yang '/usr/local/share/yang' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 yang/frr-ospfd.yang yang/frr-pathd.yang '/usr/local/share/yang' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/frr/eigrpd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 eigrpd/eigrp_dump.h eigrpd/eigrp_topology.h eigrpd/eigrpd.h '/usr/local/include/frr/eigrpd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/frr/mgmtd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 mgmtd/mgmt_defines.h '/usr/local/include/frr/mgmtd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/lib/frr/modules' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c zebra/zebra_irdp.la zebra/zebra_cumulus_mlag.la zebra/dplane_fpm_nl.la bgpd/bgpd_bmp.la pathd/pathd_pcep.la '/usr/local/lib/frr/modules' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c zebra/.libs/zebra_irdp.so /usr/local/lib/frr/modules/zebra_irdp.so Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c zebra/.libs/zebra_irdp.lai /usr/local/lib/frr/modules/zebra_irdp.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c zebra/.libs/zebra_cumulus_mlag.so /usr/local/lib/frr/modules/zebra_cumulus_mlag.so Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c zebra/.libs/zebra_cumulus_mlag.lai /usr/local/lib/frr/modules/zebra_cumulus_mlag.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c zebra/.libs/dplane_fpm_nl.so /usr/local/lib/frr/modules/dplane_fpm_nl.so Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c zebra/.libs/dplane_fpm_nl.lai /usr/local/lib/frr/modules/dplane_fpm_nl.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: (cd /src/frr; /bin/bash "/src/frr/libtool" --silent --tag CC --mode=relink clang -std=gnu11 -fms-extensions -fno-omit-frame-pointer -funwind-tables -Wextra -Wformat-nonliteral -Wformat-security -Wswitch-enum -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -Wpointer-arith -Wbad-function-cast -Wwrite-strings -Wundef -Wno-unused-result -Wno-unused-parameter -Wno-missing-field-initializers -fsanitize=fuzzer-no-link -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DFUZZING_OVERRIDE_LLVMFuzzerTestOneInput -export-dynamic -avoid-version -module -shared -fsanitize=fuzzer-no-link -g -o bgpd/bgpd_bmp.la -rpath /usr/local/lib/frr/modules bgpd/bgp_bmp.lo lib/libfrrcares.la -ljson-c -lrt ) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c bgpd/.libs/bgpd_bmp.soT /usr/local/lib/frr/modules/bgpd_bmp.so Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c bgpd/.libs/bgpd_bmp.lai /usr/local/lib/frr/modules/bgpd_bmp.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pathd/.libs/pathd_pcep.so /usr/local/lib/frr/modules/pathd_pcep.so Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c pathd/.libs/pathd_pcep.lai /usr/local/lib/frr/modules/pathd_pcep.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/sbin" ldconfig -n /usr/local/lib/frr/modules Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/frr/modules Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR' Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following: Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during execution Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during linking Step #3 - "compile-libfuzzer-coverage-x86_64": - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #3 - "compile-libfuzzer-coverage-x86_64": - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages. Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 lib/route_types.h lib/version.h '/usr/local/include/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/frr/ospfapi' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ospfclient/ospf_apiclient.h '/usr/local/include/frr/ospfapi' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/frr/ospfd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ospfd/ospf_api.h ospfd/ospf_asbr.h ospfd/ospf_dump.h ospfd/ospf_dump_api.h ospfd/ospf_ism.h ospfd/ospf_lsa.h ospfd/ospf_lsdb.h ospfd/ospf_nsm.h ospfd/ospf_opaque.h ospfd/ospfd.h '/usr/local/include/frr/ospfd' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/include/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 lib/admin_group.h lib/affinitymap.h lib/agg_table.h lib/asn.h lib/atomlist.h lib/base64.h lib/bfd.h lib/bitfield.h lib/buffer.h lib/checksum.h lib/mlag.h lib/command.h lib/command_graph.h lib/command_match.h lib/compiler.h lib/cspf.h lib/csv.h lib/darr.h lib/db.h lib/debug.h lib/defaults.h lib/distribute.h lib/ferr.h lib/filter.h lib/flex_algo.h lib/freebsd-queue.h lib/frrlua.h lib/frrscript.h lib/frr_pthread.h lib/frratomic.h lib/frrcu.h lib/frrstr.h lib/graph.h lib/hash.h lib/hook.h lib/iana_afi.h lib/id_alloc.h lib/if.h lib/if_rmap.h lib/imsg.h '/usr/local/include/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 lib/ipaddr.h lib/iso.h lib/jhash.h lib/json.h lib/keychain.h lib/ldp_sync.h lib/lib_errors.h lib/lib_vty.h lib/libfrr.h lib/libfrr_trace.h lib/libospf.h lib/linklist.h lib/link_state.h lib/log.h lib/log_vty.h lib/md5.h lib/memory.h lib/mgmt.pb-c.h lib/mgmt_be_client.h lib/mgmt_fe_client.h lib/mgmt_msg.h lib/mgmt_pb.h lib/module.h lib/monotime.h lib/mpls.h lib/srv6.h lib/network.h lib/nexthop.h lib/nexthop_group.h lib/nexthop_group_private.h lib/northbound.h lib/northbound_cli.h lib/northbound_db.h lib/ns.h lib/openbsd-queue.h lib/openbsd-tree.h lib/plist.h lib/prefix.h lib/printfrr.h lib/privs.h '/usr/local/include/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 lib/ptm_lib.h lib/pullwr.h lib/pw.h lib/qobj.h lib/queue.h lib/ringbuf.h lib/routemap.h lib/route_opaque.h lib/sbuf.h lib/seqlock.h lib/sha256.h lib/sigevent.h lib/skiplist.h lib/smux.h lib/sockopt.h lib/sockunion.h lib/spf_backoff.h lib/segment_routing.h lib/srcdest_table.h lib/srte.h lib/stream.h lib/systemd.h lib/table.h lib/termtable.h lib/frrevent.h lib/trace.h lib/typerb.h lib/typesafe.h lib/vector.h lib/vlan.h lib/vrf.h lib/vrf_int.h lib/vty.h lib/vxlan.h lib/wheel.h lib/workqueue.h lib/xref.h lib/yang.h lib/yang_translator.h lib/yang_wrappers.h '/usr/local/include/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 lib/zclient.h lib/zebra.h lib/zlog.h lib/zlog_5424.h lib/zlog_live.h lib/zlog_targets.h lib/pbr.h lib/tc.h lib/routing_nb.h lib/assert/assert.h lib/resolver.h '/usr/local/include/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/man/man1' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/manpages/_build/man/frr.1 doc/manpages/_build/man/vtysh.1 '/usr/local/share/man/man1' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/usr/local/share/man/man8' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 doc/manpages/_build/man/frr-zebra.8 doc/manpages/_build/man/frr-watchfrr.8 doc/manpages/_build/man/frr-bgpd.8 doc/manpages/_build/man/frr-ripd.8 doc/manpages/_build/man/frr-ripngd.8 doc/manpages/_build/man/frr-ospfd.8 doc/manpages/_build/man/frr-ospf6d.8 doc/manpages/_build/man/frr-isisd.8 doc/manpages/_build/man/frr-nhrpd.8 doc/manpages/_build/man/frr-ldpd.8 doc/manpages/_build/man/frr-eigrpd.8 doc/manpages/_build/man/frr-pimd.8 doc/manpages/_build/man/mtracebis.8 doc/manpages/_build/man/frr-pbrd.8 doc/manpages/_build/man/frr-staticd.8 doc/manpages/_build/man/frr-bfdd.8 doc/manpages/_build/man/frr-vrrpd.8 '/usr/local/share/man/man8' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/frr' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp ./lib/.libs/libfrr.so.0 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/bin/bgpd /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/bin/ospfd /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/bin/pimd /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/bin/zebra /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/corpi Step #3 - "compile-libfuzzer-coverage-x86_64": + find . -type d -maxdepth 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -maxdepth after the argument -type, but global options are not positional, i.e., -maxdepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/._seed_corpus.zip ./LICENSE ./README.md ./bgpd ./bird ./ospfd ./pimd ./vrrpd ./zebra Step #3 - "compile-libfuzzer-coverage-x86_64": adding: LICENSE (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: README.md (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/./ospfd_seed_corpus.zip ./ospfd/README.md ./ospfd/gen ./ospfd/seed Step #3 - "compile-libfuzzer-coverage-x86_64": adding: README.md (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/./bgpd_seed_corpus.zip ./bgpd/README.md ./bgpd/gen ./bgpd/seed Step #3 - "compile-libfuzzer-coverage-x86_64": adding: README.md (deflated 22%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/./pimd_seed_corpus.zip ./pimd/README.md ./pimd/gen ./pimd/seed Step #3 - "compile-libfuzzer-coverage-x86_64": adding: README.md (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/./bird_seed_corpus.zip ./bird/README.md ./bird/gen Step #3 - "compile-libfuzzer-coverage-x86_64": adding: README.md (deflated 5%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/./zebra_seed_corpus.zip ./zebra/README.md ./zebra/zapi Step #3 - "compile-libfuzzer-coverage-x86_64": adding: README.md (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/./.git_seed_corpus.zip ./.git/HEAD ./.git/branches ./.git/config ./.git/description ./.git/hooks ./.git/index ./.git/info ./.git/logs ./.git/objects ./.git/packed-refs ./.git/refs ./.git/shallow Step #3 - "compile-libfuzzer-coverage-x86_64": adding: HEAD (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: config (deflated 36%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: description (deflated 14%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: index (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: packed-refs (deflated 10%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: shallow (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -j /workspace/out/libfuzzer-coverage-x86_64/./vrrpd_seed_corpus.zip ./vrrpd/README.md ./vrrpd/gen ./vrrpd/seed Step #3 - "compile-libfuzzer-coverage-x86_64": adding: README.md (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + find /workspace/out/libfuzzer-coverage-x86_64 -maxdepth 1 -type f -executable Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + grep LLVMFuzzerTestOneInput /workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": + patchelf --set-rpath '$ORIGIN/lib' /workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/ospfd libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /lib/x86_64-linux-gnu/libpcre2-8.so.0 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/ospfd libyang Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /lib/x86_64-linux-gnu/libyang.so.2 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/ospfd libelf Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: missing destination file operand after '/workspace/out/libfuzzer-coverage-x86_64/lib/' Step #3 - "compile-libfuzzer-coverage-x86_64": Try 'cp --help' for more information. Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/ospfd libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /lib/x86_64-linux-gnu/libjson-c.so.4 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/ospfd libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/ospfd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /lib/x86_64-linux-gnu/libprotobuf-c.so.1 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + grep LLVMFuzzerTestOneInput /workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": + patchelf --set-rpath '$ORIGIN/lib' /workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/bgpd libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /lib/x86_64-linux-gnu/libpcre2-8.so.0 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/bgpd libyang Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/bgpd libelf Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: missing destination file operand after '/workspace/out/libfuzzer-coverage-x86_64/lib/' Step #3 - "compile-libfuzzer-coverage-x86_64": Try 'cp --help' for more information. Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/bgpd libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/bgpd libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/bgpd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + grep LLVMFuzzerTestOneInput /workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": + patchelf --set-rpath '$ORIGIN/lib' /workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/pimd libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /lib/x86_64-linux-gnu/libpcre2-8.so.0 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/pimd libyang Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/pimd libelf Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: missing destination file operand after '/workspace/out/libfuzzer-coverage-x86_64/lib/' Step #3 - "compile-libfuzzer-coverage-x86_64": Try 'cp --help' for more information. Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/pimd libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/pimd libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/pimd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + grep LLVMFuzzerTestOneInput /workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": + patchelf --set-rpath '$ORIGIN/lib' /workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/zebra libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libpcre2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /lib/x86_64-linux-gnu/libpcre2-8.so.0 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/zebra libyang Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libyang Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/zebra libelf Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libelf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: missing destination file operand after '/workspace/out/libfuzzer-coverage-x86_64/lib/' Step #3 - "compile-libfuzzer-coverage-x86_64": Try 'cp --help' for more information. Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/zebra libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libjson-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libjson-c.so.4' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + copy_lib /workspace/out/libfuzzer-coverage-x86_64/zebra libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_path=/workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": + local lib=libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ ldd /workspace/out/libfuzzer-coverage-x86_64/zebra Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep libprotobuf-c Step #3 - "compile-libfuzzer-coverage-x86_64": ++ awk '{ print $3 }' Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1 /workspace/out/libfuzzer-coverage-x86_64/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": cp: '/workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1' and '/workspace/out/libfuzzer-coverage-x86_64/lib/libprotobuf-c.so.1' are the same file Step #3 - "compile-libfuzzer-coverage-x86_64": + true Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + grep LLVMFuzzerTestOneInput /workspace/out/libfuzzer-coverage-x86_64/llvm-symbolizer Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + patchelf --remove-needed libpcre2-8.so.0 /workspace/out/libfuzzer-coverage-x86_64/lib/libyang.so.2 Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: ee06c35af532: Already exists Step #4: c36614e90b60: Already exists Step #4: 98ec86b48d6a: Pulling fs layer Step #4: 0ac5e2f60d1e: Pulling fs layer Step #4: c4558f40ae30: Pulling fs layer Step #4: 99fb824f3a73: Pulling fs layer Step #4: 1520db3c4ef9: Pulling fs layer Step #4: 38f47f48f934: Pulling fs layer Step #4: 2ec5d19345f4: Pulling fs layer Step #4: 4dff2b6ddec6: Pulling fs layer Step #4: 039388f18868: Pulling fs layer Step #4: 90a817c44129: Pulling fs layer Step #4: b0f8ddb39088: Pulling fs layer Step #4: a2f57b840987: Pulling fs layer Step #4: 80e4f52ec1f6: Pulling fs layer Step #4: 07ffc57df921: Pulling fs layer Step #4: 1520db3c4ef9: Waiting Step #4: b0f8ddb39088: Waiting Step #4: 38f47f48f934: Waiting Step #4: a2f57b840987: Waiting Step #4: 2ec5d19345f4: Waiting Step #4: 80e4f52ec1f6: Waiting Step #4: 07ffc57df921: Waiting Step #4: 039388f18868: Waiting Step #4: 4dff2b6ddec6: Waiting Step #4: 90a817c44129: Waiting Step #4: 99fb824f3a73: Waiting Step #4: c4558f40ae30: Verifying Checksum Step #4: c4558f40ae30: Download complete Step #4: 98ec86b48d6a: Verifying Checksum Step #4: 98ec86b48d6a: Download complete Step #4: 0ac5e2f60d1e: Verifying Checksum Step #4: 0ac5e2f60d1e: Download complete Step #4: 38f47f48f934: Verifying Checksum Step #4: 38f47f48f934: Download complete Step #4: 1520db3c4ef9: Verifying Checksum Step #4: 1520db3c4ef9: Download complete Step #4: 2ec5d19345f4: Verifying Checksum Step #4: 2ec5d19345f4: Download complete Step #4: 98ec86b48d6a: Pull complete Step #4: 039388f18868: Verifying Checksum Step #4: 039388f18868: Download complete Step #4: 4dff2b6ddec6: Verifying Checksum Step #4: 4dff2b6ddec6: Download complete Step #4: 0ac5e2f60d1e: Pull complete Step #4: b0f8ddb39088: Verifying Checksum Step #4: b0f8ddb39088: Download complete Step #4: c4558f40ae30: Pull complete Step #4: a2f57b840987: Verifying Checksum Step #4: a2f57b840987: Download complete Step #4: 99fb824f3a73: Verifying Checksum Step #4: 99fb824f3a73: Download complete Step #4: 07ffc57df921: Download complete Step #4: 90a817c44129: Verifying Checksum Step #4: 90a817c44129: Download complete Step #4: 80e4f52ec1f6: Verifying Checksum Step #4: 80e4f52ec1f6: Download complete Step #4: 99fb824f3a73: Pull complete Step #4: 1520db3c4ef9: Pull complete Step #4: 38f47f48f934: Pull complete Step #4: 2ec5d19345f4: Pull complete Step #4: 4dff2b6ddec6: Pull complete Step #4: 039388f18868: Pull complete Step #4: 90a817c44129: Pull complete Step #4: b0f8ddb39088: Pull complete Step #4: a2f57b840987: Pull complete Step #4: 80e4f52ec1f6: Pull complete Step #4: 07ffc57df921: Pull complete Step #4: Digest: sha256:a830664167ebe97d061360b8c97eeab6f26e4802b39d82e7b8171df38eb92729 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running ospfd Step #5: Running bgpd Step #5: Running pimd Step #5: Running zebra Step #5: Error occured while running ospfd: Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3843276235 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: MERGE-OUTER: 3237 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3843303090 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 0 processed earlier; will process 3237 files now Step #5: #1 pulse cov: 610 ft: 611 exec/s: 0 rss: 32Mb Step #5: #2 pulse cov: 611 ft: 619 exec/s: 0 rss: 33Mb Step #5: #4 pulse cov: 611 ft: 619 exec/s: 0 rss: 33Mb Step #5: #8 pulse cov: 611 ft: 619 exec/s: 0 rss: 33Mb Step #5: #16 pulse cov: 639 ft: 648 exec/s: 0 rss: 33Mb Step #5: #32 pulse cov: 641 ft: 650 exec/s: 0 rss: 33Mb Step #5: #64 pulse cov: 643 ft: 652 exec/s: 0 rss: 33Mb Step #5: #128 pulse cov: 687 ft: 700 exec/s: 0 rss: 33Mb Step #5: #256 pulse cov: 695 ft: 716 exec/s: 0 rss: 33Mb Step #5: #512 pulse cov: 877 ft: 1078 exec/s: 0 rss: 34Mb Step #5: #1024 pulse cov: 995 ft: 1257 exec/s: 0 rss: 34Mb Step #5: #2048 pulse cov: 1392 ft: 2087 exec/s: 0 rss: 34Mb Step #5: #3237 DONE cov: 1442 ft: 4526 exec/s: 0 rss: 44Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==75==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe601b6b10 T75) Step #5: ==75==The signal is caused by a READ memory access. Step #5: ==75==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fb10607c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fb10607ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fb10605a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==75==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 2 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3844919590 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==88==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff3cbcae00 T88) Step #5: ==88==The signal is caused by a READ memory access. Step #5: ==88==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7897f468a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7897f46a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7897f24082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==88==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 3 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3845798115 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==94==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc8bae9510 T94) Step #5: ==94==The signal is caused by a READ memory access. Step #5: ==94==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f954f8098a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f954f809a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f954f7e7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==94==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 4 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3846681900 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==106==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe5587e280 T106) Step #5: ==106==The signal is caused by a READ memory access. Step #5: ==106==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f42fb63c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f42fb63ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f42fb61a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==106==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 5 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3847551239 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==118==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffae3ae710 T118) Step #5: ==118==The signal is caused by a READ memory access. Step #5: ==118==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f84fc5778a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f84fc577a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f84fc555082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==118==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 6 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3848424109 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==129==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff6d4f7770 T129) Step #5: ==129==The signal is caused by a READ memory access. Step #5: ==129==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f15123108a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1512310a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f15122ee082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==129==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 7 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3849299622 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==138==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcc0fab450 T138) Step #5: ==138==The signal is caused by a READ memory access. Step #5: ==138==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa8e4b2c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa8e4b2ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa8e4b0a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==138==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 8 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3850175883 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==150==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd8653c220 T150) Step #5: ==150==The signal is caused by a READ memory access. Step #5: ==150==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f56ff1f48a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f56ff1f4a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f56ff1d2082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==150==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 9 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3851057512 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==162==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc40e773a0 T162) Step #5: ==162==The signal is caused by a READ memory access. Step #5: ==162==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f83392198a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8339219a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f83391f7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==162==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 10 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3851937756 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==171==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe1f41d040 T171) Step #5: ==171==The signal is caused by a READ memory access. Step #5: ==171==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fca5f3408a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fca5f340a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fca5f31e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==171==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 11 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3852816487 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==178==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff2ac608e0 T178) Step #5: ==178==The signal is caused by a READ memory access. Step #5: ==178==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f69629438a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6962943a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6962921082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==178==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 12 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3853691936 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==190==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe5d950720 T190) Step #5: ==190==The signal is caused by a READ memory access. Step #5: ==190==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff3355788a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff335578a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff335556082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==190==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 13 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3854572838 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==202==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffef1dfa3b0 T202) Step #5: ==202==The signal is caused by a READ memory access. Step #5: ==202==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f57ba9498a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f57ba949a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f57ba927082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==202==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 14 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3855447589 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==214==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcb5fc5950 T214) Step #5: ==214==The signal is caused by a READ memory access. Step #5: ==214==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fcbfff528a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fcbfff52a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fcbfff30082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==214==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 15 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3856313704 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==229==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffff66740a0 T229) Step #5: ==229==The signal is caused by a READ memory access. Step #5: ==229==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f347cf398a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f347cf39a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f347cf17082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==229==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 16 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3857192354 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==241==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffedcef5a20 T241) Step #5: ==241==The signal is caused by a READ memory access. Step #5: ==241==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fadda1288a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fadda128a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fadda106082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==241==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 17 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3858065566 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==253==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffa77234d0 T253) Step #5: ==253==The signal is caused by a READ memory access. Step #5: ==253==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f2dfe8558a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f2dfe855a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f2dfe833082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==253==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 18 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3858948719 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==264==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc39caa790 T264) Step #5: ==264==The signal is caused by a READ memory access. Step #5: ==264==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f2c8f3fd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f2c8f3fda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f2c8f3db082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==264==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 19 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3859826866 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==273==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe6a382c30 T273) Step #5: ==273==The signal is caused by a READ memory access. Step #5: ==273==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f068ab6d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f068ab6da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f068ab4b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==273==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 20 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3860705504 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==285==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe2d3dfec0 T285) Step #5: ==285==The signal is caused by a READ memory access. Step #5: ==285==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f8bfa4088a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8bfa408a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f8bfa3e6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==285==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 21 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3861582105 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==297==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdf5b3f560 T297) Step #5: ==297==The signal is caused by a READ memory access. Step #5: ==297==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f05cb2028a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f05cb202a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f05cb1e0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==297==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 22 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3862462197 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==309==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc9fd207b0 T309) Step #5: ==309==The signal is caused by a READ memory access. Step #5: ==309==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4a48b128a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4a48b12a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4a48af0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==309==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 23 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3863338312 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==321==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd5385eca0 T321) Step #5: ==321==The signal is caused by a READ memory access. Step #5: ==321==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc36e36d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc36e36da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc36e34b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==321==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 24 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3864213412 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==333==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff6e898560 T333) Step #5: ==333==The signal is caused by a READ memory access. Step #5: ==333==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4a8194c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4a8194ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4a8192a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==333==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 25 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3865086429 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==345==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc30867f00 T345) Step #5: ==345==The signal is caused by a READ memory access. Step #5: ==345==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7febea8478a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7febea847a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7febea825082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==345==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 26 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3865957448 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==357==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff6e2580c0 T357) Step #5: ==357==The signal is caused by a READ memory access. Step #5: ==357==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa5765698a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa576569a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa576547082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==357==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 27 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3866834675 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==369==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc682dea80 T369) Step #5: ==369==The signal is caused by a READ memory access. Step #5: ==369==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7efc89cc48a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7efc89cc4a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7efc89ca2082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==369==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 28 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3867707961 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==381==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff9c006e90 T381) Step #5: ==381==The signal is caused by a READ memory access. Step #5: ==381==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f91932248a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f9193224a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9193202082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==381==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 29 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3868586043 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==393==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff35804e10 T393) Step #5: ==393==The signal is caused by a READ memory access. Step #5: ==393==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe47d4bd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe47d4bda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe47d49b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==393==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 30 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3869455754 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==405==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe51b4b1a0 T405) Step #5: ==405==The signal is caused by a READ memory access. Step #5: ==405==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f3d44a438a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3d44a43a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f3d44a21082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==405==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 31 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3870330028 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==417==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff4e7c0fb0 T417) Step #5: ==417==The signal is caused by a READ memory access. Step #5: ==417==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f9dc94ea8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f9dc94eaa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9dc94c8082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==417==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 32 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3871206261 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==429==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdac2faba0 T429) Step #5: ==429==The signal is caused by a READ memory access. Step #5: ==429==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f556dc898a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f556dc89a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f556dc67082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==429==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 33 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3872075689 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==441==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcca2a5520 T441) Step #5: ==441==The signal is caused by a READ memory access. Step #5: ==441==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fef7d7998a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fef7d799a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fef7d777082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==441==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 34 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3872951673 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==453==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe5fdb2200 T453) Step #5: ==453==The signal is caused by a READ memory access. Step #5: ==453==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fbceec808a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fbceec80a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fbceec5e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==453==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 35 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3873830327 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==465==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffca04034d0 T465) Step #5: ==465==The signal is caused by a READ memory access. Step #5: ==465==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f102aad58a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f102aad5a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f102aab3082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==465==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 36 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3874698270 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==477==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffecb057500 T477) Step #5: ==477==The signal is caused by a READ memory access. Step #5: ==477==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff85251b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff85251ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff8524f9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==477==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 37 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3875573228 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==489==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff677359b0 T489) Step #5: ==489==The signal is caused by a READ memory access. Step #5: ==489==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f39760588a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3976058a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f3976036082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==489==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 38 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3876449113 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==501==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc7dfb9a40 T501) Step #5: ==501==The signal is caused by a READ memory access. Step #5: ==501==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5676b608a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5676b60a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5676b3e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==501==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 39 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3877317313 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==511==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffeb2fd2780 T511) Step #5: ==511==The signal is caused by a READ memory access. Step #5: ==511==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7efe1cd228a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7efe1cd22a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7efe1cd00082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==511==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 40 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3878186322 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==521==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff6efffd70 T521) Step #5: ==521==The signal is caused by a READ memory access. Step #5: ==521==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f2aac8038a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f2aac803a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f2aac7e1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==521==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 41 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3879053052 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==533==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff8126adf0 T533) Step #5: ==533==The signal is caused by a READ memory access. Step #5: ==533==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fcb2b9418a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fcb2b941a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fcb2b91f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==533==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 42 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3879930740 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==545==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc55d846b0 T545) Step #5: ==545==The signal is caused by a READ memory access. Step #5: ==545==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f42889bb8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f42889bba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4288999082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==545==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 43 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3880801991 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==557==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe4809b120 T557) Step #5: ==557==The signal is caused by a READ memory access. Step #5: ==557==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4e211578a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4e21157a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4e21135082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==557==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 44 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3881667776 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==569==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd07fed9d0 T569) Step #5: ==569==The signal is caused by a READ memory access. Step #5: ==569==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0d78b398a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0d78b39a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0d78b17082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==569==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 45 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3882542623 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==581==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd35c95440 T581) Step #5: ==581==The signal is caused by a READ memory access. Step #5: ==581==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f47b1def8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f47b1defa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f47b1dcd082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==581==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 46 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3883417779 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==593==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff31e50520 T593) Step #5: ==593==The signal is caused by a READ memory access. Step #5: ==593==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc1114aa8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc1114aaa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc111488082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==593==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 47 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3884285542 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==605==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffaf3fe5c0 T605) Step #5: ==605==The signal is caused by a READ memory access. Step #5: ==605==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f58ea8db8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f58ea8dba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f58ea8b9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==605==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 48 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3885160190 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==617==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd1d564130 T617) Step #5: ==617==The signal is caused by a READ memory access. Step #5: ==617==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa3c250f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa3c250fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa3c24ed082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==617==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 49 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3886030119 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==629==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe79feb850 T629) Step #5: ==629==The signal is caused by a READ memory access. Step #5: ==629==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7b869798a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7b86979a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7b86957082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==629==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 50 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3886901206 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==641==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd9a640940 T641) Step #5: ==641==The signal is caused by a READ memory access. Step #5: ==641==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc98313c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc98313ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc98311a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==641==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 51 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3887776806 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==652==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff01dfcd50 T652) Step #5: ==652==The signal is caused by a READ memory access. Step #5: ==652==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe9cf0528a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe9cf052a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe9cf030082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==652==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 52 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3888647865 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==661==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc6a2aa6a0 T661) Step #5: ==661==The signal is caused by a READ memory access. Step #5: ==661==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f41926878a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4192687a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4192665082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==661==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 53 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3889520937 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==673==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcd8707d00 T673) Step #5: ==673==The signal is caused by a READ memory access. Step #5: ==673==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc30aa138a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc30aa13a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc30a9f1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==673==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 54 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3890394433 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==685==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe93a1e2d0 T685) Step #5: ==685==The signal is caused by a READ memory access. Step #5: ==685==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4194ed08a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4194ed0a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4194eae082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==685==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 55 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3891269801 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==697==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd6365e080 T697) Step #5: ==697==The signal is caused by a READ memory access. Step #5: ==697==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fbb3f83d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fbb3f83da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fbb3f81b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==697==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 56 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3892140030 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==709==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd86bd0b40 T709) Step #5: ==709==The signal is caused by a READ memory access. Step #5: ==709==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0f1b9308a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0f1b930a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0f1b90e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==709==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 57 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3893021377 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==721==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc2c099190 T721) Step #5: ==721==The signal is caused by a READ memory access. Step #5: ==721==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fda4997f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fda4997fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fda4995d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==721==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 58 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3893881675 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==733==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff27dd8b00 T733) Step #5: ==733==The signal is caused by a READ memory access. Step #5: ==733==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f47b93228a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f47b9322a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f47b9300082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==733==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 59 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3894757512 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==745==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffd4b9ae00 T745) Step #5: ==745==The signal is caused by a READ memory access. Step #5: ==745==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa17e0438a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa17e043a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa17e021082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==745==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 60 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3895625088 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==757==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffdf23cdc0 T757) Step #5: ==757==The signal is caused by a READ memory access. Step #5: ==757==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd25b79d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd25b79da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd25b77b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==757==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 61 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3896488085 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==769==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd535a30a0 T769) Step #5: ==769==The signal is caused by a READ memory access. Step #5: ==769==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f720ef628a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f720ef62a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f720ef40082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==769==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 62 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3897363482 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==781==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd576ef710 T781) Step #5: ==781==The signal is caused by a READ memory access. Step #5: ==781==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f8b689cd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8b689cda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f8b689ab082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==781==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 63 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3898232767 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==793==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd6ae42ee0 T793) Step #5: ==793==The signal is caused by a READ memory access. Step #5: ==793==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7efe9ff1f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7efe9ff1fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7efe9fefd082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==793==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 64 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3899112169 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==805==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffeb58b5ce0 T805) Step #5: ==805==The signal is caused by a READ memory access. Step #5: ==805==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f953f1598a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f953f159a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f953f137082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==805==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 65 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3899987976 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==816==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcf0121c50 T816) Step #5: ==816==The signal is caused by a READ memory access. Step #5: ==816==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5a130d58a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5a130d5a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5a130b3082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==816==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 66 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3900863539 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==825==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd1ca3d350 T825) Step #5: ==825==The signal is caused by a READ memory access. Step #5: ==825==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fde54bb08a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fde54bb0a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fde54b8e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==825==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 67 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3901736812 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==837==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc47770340 T837) Step #5: ==837==The signal is caused by a READ memory access. Step #5: ==837==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f3067a048a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3067a04a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f30679e2082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==837==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 68 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3902612659 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==849==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdbea37c00 T849) Step #5: ==849==The signal is caused by a READ memory access. Step #5: ==849==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f22b060e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f22b060ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f22b05ec082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==849==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 69 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3903487228 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==861==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdbd8a0c20 T861) Step #5: ==861==The signal is caused by a READ memory access. Step #5: ==861==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5a93e9a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5a93e9aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5a93e78082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==861==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 70 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3904359801 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==873==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd7cfd3d60 T873) Step #5: ==873==The signal is caused by a READ memory access. Step #5: ==873==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5916b268a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5916b26a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5916b04082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==873==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 71 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3905236201 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==885==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffde48d4280 T885) Step #5: ==885==The signal is caused by a READ memory access. Step #5: ==885==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f9ca73ec8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f9ca73eca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9ca73ca082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==885==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 72 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3906113012 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==897==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd543d2290 T897) Step #5: ==897==The signal is caused by a READ memory access. Step #5: ==897==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7efc907f88a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7efc907f8a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7efc907d6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==897==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 73 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3906986380 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==909==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd86397e20 T909) Step #5: ==909==The signal is caused by a READ memory access. Step #5: ==909==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f6ba9a5b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6ba9a5ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6ba9a39082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==909==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 74 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3907849887 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==921==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffda7940ad0 T921) Step #5: ==921==The signal is caused by a READ memory access. Step #5: ==921==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc400cc18a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc400cc1a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc400c9f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==921==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 75 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3908728329 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==933==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc4c047580 T933) Step #5: ==933==The signal is caused by a READ memory access. Step #5: ==933==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f12e587d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f12e587da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f12e585b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==933==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 76 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3909603130 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==945==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd12e45180 T945) Step #5: ==945==The signal is caused by a READ memory access. Step #5: ==945==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f07d4bfa8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f07d4bfaa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f07d4bd8082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==945==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 77 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3910479321 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==957==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc8d16ec20 T957) Step #5: ==957==The signal is caused by a READ memory access. Step #5: ==957==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fb67de108a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fb67de10a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fb67ddee082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==957==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 78 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3911351870 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==969==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd378b0800 T969) Step #5: ==969==The signal is caused by a READ memory access. Step #5: ==969==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc4f18528a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc4f1852a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc4f1830082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==969==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 79 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3912229040 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==981==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff34051250 T981) Step #5: ==981==The signal is caused by a READ memory access. Step #5: ==981==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f739a7448a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f739a744a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f739a722082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==981==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 80 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3913103637 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==993==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdc043c540 T993) Step #5: ==993==The signal is caused by a READ memory access. Step #5: ==993==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f18bfbc78a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f18bfbc7a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f18bfba5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==993==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 81 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3913976240 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1005==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd5fbf3240 T1005) Step #5: ==1005==The signal is caused by a READ memory access. Step #5: ==1005==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa8ccc928a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa8ccc92a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa8ccc70082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1005==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 82 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3914849268 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1017==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc9d7a0e10 T1017) Step #5: ==1017==The signal is caused by a READ memory access. Step #5: ==1017==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0bbcd4b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0bbcd4ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0bbcd29082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1017==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 83 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3915725159 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1029==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcece81920 T1029) Step #5: ==1029==The signal is caused by a READ memory access. Step #5: ==1029==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0fb0d188a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0fb0d18a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0fb0cf6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1029==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 84 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3916600522 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1039==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe0ec18f90 T1039) Step #5: ==1039==The signal is caused by a READ memory access. Step #5: ==1039==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff0c15508a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff0c1550a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff0c152e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1039==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 85 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3917468575 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1049==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff30906d40 T1049) Step #5: ==1049==The signal is caused by a READ memory access. Step #5: ==1049==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc08124c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc08124ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc08122a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1049==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 86 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3918341893 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1061==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd3d9ccc10 T1061) Step #5: ==1061==The signal is caused by a READ memory access. Step #5: ==1061==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f442bd978a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f442bd97a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f442bd75082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1061==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 87 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3919217889 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1073==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdef42fa70 T1073) Step #5: ==1073==The signal is caused by a READ memory access. Step #5: ==1073==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f08697ba8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f08697baa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0869798082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1073==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 88 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3920098091 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1085==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffec802f280 T1085) Step #5: ==1085==The signal is caused by a READ memory access. Step #5: ==1085==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f32dcd618a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f32dcd61a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f32dcd3f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1085==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 89 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3920968428 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1097==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe22e4a800 T1097) Step #5: ==1097==The signal is caused by a READ memory access. Step #5: ==1097==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1cefc6a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1cefc6aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1cefc48082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1097==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 90 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3921847051 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1109==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdc45ffef0 T1109) Step #5: ==1109==The signal is caused by a READ memory access. Step #5: ==1109==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f36f28538a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f36f2853a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f36f2831082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1109==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 91 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3922724817 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1121==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd03e40900 T1121) Step #5: ==1121==The signal is caused by a READ memory access. Step #5: ==1121==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f48c74cb8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f48c74cba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f48c74a9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1121==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 92 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3923602599 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1133==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe52bc1b80 T1133) Step #5: ==1133==The signal is caused by a READ memory access. Step #5: ==1133==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f94206758a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f9420675a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9420653082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1133==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 93 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3924473425 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1145==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd18e1ed70 T1145) Step #5: ==1145==The signal is caused by a READ memory access. Step #5: ==1145==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa834b4d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa834b4da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa834b2b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1145==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 94 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3925346491 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1155==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc25e9f3f0 T1155) Step #5: ==1155==The signal is caused by a READ memory access. Step #5: ==1155==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1093f188a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1093f18a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1093ef6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1155==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 95 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3926212156 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1165==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc32081520 T1165) Step #5: ==1165==The signal is caused by a READ memory access. Step #5: ==1165==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa6403bf8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa6403bfa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa64039d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1165==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 96 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3927086537 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1177==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffd06e6e10 T1177) Step #5: ==1177==The signal is caused by a READ memory access. Step #5: ==1177==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fae3a6fd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fae3a6fda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fae3a6db082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1177==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 97 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3927961949 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1189==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffc0df9510 T1189) Step #5: ==1189==The signal is caused by a READ memory access. Step #5: ==1189==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f05744cd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f05744cda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f05744ab082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1189==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 98 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3928835147 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1201==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcd6a3ca40 T1201) Step #5: ==1201==The signal is caused by a READ memory access. Step #5: ==1201==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd4e5d3c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd4e5d3ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd4e5d1a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1201==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 99 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3929711201 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1213==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff29d85370 T1213) Step #5: ==1213==The signal is caused by a READ memory access. Step #5: ==1213==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe3b7d7f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe3b7d7fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe3b7d5d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1213==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 100 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3930590265 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1225==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff0aa376b0 T1225) Step #5: ==1225==The signal is caused by a READ memory access. Step #5: ==1225==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7facc9b128a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7facc9b12a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7facc9af0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1225==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 101 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3931468624 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1237==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc7af051b0 T1237) Step #5: ==1237==The signal is caused by a READ memory access. Step #5: ==1237==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f39a75d18a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f39a75d1a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f39a75af082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1237==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 102 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3932343533 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1249==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff12c78800 T1249) Step #5: ==1249==The signal is caused by a READ memory access. Step #5: ==1249==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f02ceff38a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f02ceff3a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f02cefd1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1249==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 103 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3933221250 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1262==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffea8ab2470 T1262) Step #5: ==1262==The signal is caused by a READ memory access. Step #5: ==1262==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f6feb4fd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6feb4fda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6feb4db082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1262==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 104 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3934093962 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1278==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd6f2fdee0 T1278) Step #5: ==1278==The signal is caused by a READ memory access. Step #5: ==1278==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe7359d68a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe7359d6a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe7359b4082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1278==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 105 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3934963895 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1294==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff8bc5e670 T1294) Step #5: ==1294==The signal is caused by a READ memory access. Step #5: ==1294==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f551b2d28a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f551b2d2a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f551b2b0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1294==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 106 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3935840477 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1310==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcb25652e0 T1310) Step #5: ==1310==The signal is caused by a READ memory access. Step #5: ==1310==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fbbb31ca8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fbbb31caa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fbbb31a8082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1310==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 107 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3936716848 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1326==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcdfa11750 T1326) Step #5: ==1326==The signal is caused by a READ memory access. Step #5: ==1326==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5de80168a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5de8016a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5de7ff4082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1326==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 108 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3937595517 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1342==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdd98e1010 T1342) Step #5: ==1342==The signal is caused by a READ memory access. Step #5: ==1342==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f35547318a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3554731a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f355470f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1342==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 109 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3938468796 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1358==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff72f5e780 T1358) Step #5: ==1358==The signal is caused by a READ memory access. Step #5: ==1358==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdcbdbe98a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdcbdbe9a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdcbdbc7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1358==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 110 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3939349216 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1374==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd25032ed0 T1374) Step #5: ==1374==The signal is caused by a READ memory access. Step #5: ==1374==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f02701148a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0270114a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f02700f2082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1374==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 111 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3940227897 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1390==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffec14b9240 T1390) Step #5: ==1390==The signal is caused by a READ memory access. Step #5: ==1390==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1653d668a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1653d66a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1653d44082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1390==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 112 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3941091977 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1406==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdbeea3e10 T1406) Step #5: ==1406==The signal is caused by a READ memory access. Step #5: ==1406==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f156bf4f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f156bf4fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f156bf2d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1406==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 113 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3941959863 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1422==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff4b925a70 T1422) Step #5: ==1422==The signal is caused by a READ memory access. Step #5: ==1422==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f85bf0878a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f85bf087a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f85bf065082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1422==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 114 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3942838207 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1438==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd949268c0 T1438) Step #5: ==1438==The signal is caused by a READ memory access. Step #5: ==1438==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff15fd288a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff15fd28a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff15fd06082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1438==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 115 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3943723210 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1454==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffe089cae0 T1454) Step #5: ==1454==The signal is caused by a READ memory access. Step #5: ==1454==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f73336308a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7333630a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f733360e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1454==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 116 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3944592683 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1470==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff0dbc5fc0 T1470) Step #5: ==1470==The signal is caused by a READ memory access. Step #5: ==1470==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fecf0a6b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fecf0a6ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fecf0a49082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1470==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 117 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3945469150 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1486==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcd8e97170 T1486) Step #5: ==1486==The signal is caused by a READ memory access. Step #5: ==1486==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7868fee8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7868feea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7868fcc082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1486==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 118 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3946342815 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1502==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffb58ea300 T1502) Step #5: ==1502==The signal is caused by a READ memory access. Step #5: ==1502==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fae37d448a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fae37d44a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fae37d22082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1502==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 119 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3947219578 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1516==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe140ade30 T1516) Step #5: ==1516==The signal is caused by a READ memory access. Step #5: ==1516==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4932dc18a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4932dc1a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4932d9f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1516==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 120 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3948088527 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1529==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc799810e0 T1529) Step #5: ==1529==The signal is caused by a READ memory access. Step #5: ==1529==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f79d2db28a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f79d2db2a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f79d2d90082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1529==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 121 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3948962239 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1542==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff239ae060 T1542) Step #5: ==1542==The signal is caused by a READ memory access. Step #5: ==1542==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f81c89938a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f81c8993a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f81c8971082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1542==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 122 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3949836216 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1558==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc64c63ad0 T1558) Step #5: ==1558==The signal is caused by a READ memory access. Step #5: ==1558==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fb41c8ad8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fb41c8ada5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fb41c88b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1558==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 123 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3950714017 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1574==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc8cbb76f0 T1574) Step #5: ==1574==The signal is caused by a READ memory access. Step #5: ==1574==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f2a9bb9f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f2a9bb9fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f2a9bb7d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1574==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 124 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3951590409 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1590==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd948b8e30 T1590) Step #5: ==1590==The signal is caused by a READ memory access. Step #5: ==1590==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fb50f28a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fb50f28aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fb50f268082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1590==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 125 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3952463748 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1606==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffce19d3ac0 T1606) Step #5: ==1606==The signal is caused by a READ memory access. Step #5: ==1606==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fcd453318a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fcd45331a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fcd4530f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1606==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 126 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3953335990 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1622==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe300d3940 T1622) Step #5: ==1622==The signal is caused by a READ memory access. Step #5: ==1622==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f086081e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f086081ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f08607fc082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1622==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 127 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3954209012 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1638==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdac0fd1b0 T1638) Step #5: ==1638==The signal is caused by a READ memory access. Step #5: ==1638==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f156ef4e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f156ef4ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f156ef2c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1638==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 128 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3955078458 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1654==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff73f05e50 T1654) Step #5: ==1654==The signal is caused by a READ memory access. Step #5: ==1654==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f50e277e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f50e277ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f50e275c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1654==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 129 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3955951820 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1670==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff2959d710 T1670) Step #5: ==1670==The signal is caused by a READ memory access. Step #5: ==1670==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4ce34fc8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4ce34fca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4ce34da082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1670==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 130 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3956829381 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1686==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd1b23b6a0 T1686) Step #5: ==1686==The signal is caused by a READ memory access. Step #5: ==1686==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f2cfca7b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f2cfca7ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f2cfca59082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1686==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 131 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3957701918 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1702==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffda0a8bc0 T1702) Step #5: ==1702==The signal is caused by a READ memory access. Step #5: ==1702==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f871f82a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f871f82aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f871f808082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1702==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 132 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3958579519 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1718==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe81843c30 T1718) Step #5: ==1718==The signal is caused by a READ memory access. Step #5: ==1718==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f829621c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f829621ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f82961fa082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1718==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 133 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3959451411 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1734==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdb3dcb490 T1734) Step #5: ==1734==The signal is caused by a READ memory access. Step #5: ==1734==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f6ade5648a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6ade564a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6ade542082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1734==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 134 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3960324688 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1750==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc467966b0 T1750) Step #5: ==1750==The signal is caused by a READ memory access. Step #5: ==1750==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f9c027df8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f9c027dfa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9c027bd082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1750==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 135 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3961202638 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1766==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffde5fa3d00 T1766) Step #5: ==1766==The signal is caused by a READ memory access. Step #5: ==1766==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f084bed98a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f084bed9a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f084beb7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1766==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 136 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3962079581 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1782==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff1897c310 T1782) Step #5: ==1782==The signal is caused by a READ memory access. Step #5: ==1782==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ffa0ab9c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ffa0ab9ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ffa0ab7a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1782==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 137 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3962951145 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1798==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff2c205fa0 T1798) Step #5: ==1798==The signal is caused by a READ memory access. Step #5: ==1798==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f551ff928a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f551ff92a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f551ff70082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1798==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 138 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3963828718 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1814==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd1cf03be0 T1814) Step #5: ==1814==The signal is caused by a READ memory access. Step #5: ==1814==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdfb1a1b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdfb1a1ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdfb19f9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1814==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 139 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3964700924 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1830==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffca08c9550 T1830) Step #5: ==1830==The signal is caused by a READ memory access. Step #5: ==1830==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f789ba068a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f789ba06a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f789b9e4082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1830==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 140 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3965570103 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1846==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcccc11ae0 T1846) Step #5: ==1846==The signal is caused by a READ memory access. Step #5: ==1846==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdd7addb8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdd7addba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdd7adb9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1846==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 141 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3966443589 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1862==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffed27e6620 T1862) Step #5: ==1862==The signal is caused by a READ memory access. Step #5: ==1862==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0b117178a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0b11717a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0b116f5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1862==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 142 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3967318248 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1878==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffd4b04e20 T1878) Step #5: ==1878==The signal is caused by a READ memory access. Step #5: ==1878==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f667a2668a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f667a266a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f667a244082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1878==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 143 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3968194010 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1894==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd1ef2fa50 T1894) Step #5: ==1894==The signal is caused by a READ memory access. Step #5: ==1894==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4fdda478a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4fdda47a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4fdda25082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1894==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 144 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3969071485 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1910==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffddb386dd0 T1910) Step #5: ==1910==The signal is caused by a READ memory access. Step #5: ==1910==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4d0142f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4d0142fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4d0140d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1910==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 145 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3969948980 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1926==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffbf6bbfb0 T1926) Step #5: ==1926==The signal is caused by a READ memory access. Step #5: ==1926==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe98b31e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe98b31ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe98b2fc082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1926==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 146 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3970817534 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1942==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd728b96a0 T1942) Step #5: ==1942==The signal is caused by a READ memory access. Step #5: ==1942==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f808daf08a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f808daf0a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f808dace082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1942==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 147 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3971692384 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1958==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe19a85690 T1958) Step #5: ==1958==The signal is caused by a READ memory access. Step #5: ==1958==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f41f63898a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f41f6389a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f41f6367082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1958==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 148 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3972577269 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1973==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff72025aa0 T1973) Step #5: ==1973==The signal is caused by a READ memory access. Step #5: ==1973==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f68a73668a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f68a7366a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f68a7344082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1973==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 149 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3973456340 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==1988==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdbda935c0 T1988) Step #5: ==1988==The signal is caused by a READ memory access. Step #5: ==1988==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe8ae20d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe8ae20da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe8ae1eb082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==1988==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 150 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3974323910 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2002==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe96066990 T2002) Step #5: ==2002==The signal is caused by a READ memory access. Step #5: ==2002==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4ad4e7c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4ad4e7ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4ad4e5a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2002==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 151 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3975196526 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2018==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe4103dbc0 T2018) Step #5: ==2018==The signal is caused by a READ memory access. Step #5: ==2018==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f613aa0a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f613aa0aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f613a9e8082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2018==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 152 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3976070471 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2033==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffee6712ee0 T2033) Step #5: ==2033==The signal is caused by a READ memory access. Step #5: ==2033==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f87f98e08a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f87f98e0a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f87f98be082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2033==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 153 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3976939733 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2046==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd05486840 T2046) Step #5: ==2046==The signal is caused by a READ memory access. Step #5: ==2046==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fbb523f88a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fbb523f8a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fbb523d6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2046==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 154 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3977815097 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2062==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe62e3ed60 T2062) Step #5: ==2062==The signal is caused by a READ memory access. Step #5: ==2062==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa6eb7dc8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa6eb7dca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa6eb7ba082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2062==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 155 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3978693763 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2078==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc47e36c80 T2078) Step #5: ==2078==The signal is caused by a READ memory access. Step #5: ==2078==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f3a663b48a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3a663b4a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f3a66392082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2078==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 156 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3979568586 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2094==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdaedf0530 T2094) Step #5: ==2094==The signal is caused by a READ memory access. Step #5: ==2094==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f40422cc8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f40422cca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f40422aa082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2094==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 157 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3980446315 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2110==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe64607d50 T2110) Step #5: ==2110==The signal is caused by a READ memory access. Step #5: ==2110==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1cba3508a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1cba350a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1cba32e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2110==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 158 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3981320297 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2126==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd14b1f340 T2126) Step #5: ==2126==The signal is caused by a READ memory access. Step #5: ==2126==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f290de558a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f290de55a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f290de33082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2126==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 159 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3982183361 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2142==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe7d8a0720 T2142) Step #5: ==2142==The signal is caused by a READ memory access. Step #5: ==2142==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4bc884a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4bc884aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4bc8828082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2142==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 160 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3983061793 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2158==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc282d9880 T2158) Step #5: ==2158==The signal is caused by a READ memory access. Step #5: ==2158==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f34f4df18a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f34f4df1a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f34f4dcf082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2158==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 161 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3983927714 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2174==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffefb24d930 T2174) Step #5: ==2174==The signal is caused by a READ memory access. Step #5: ==2174==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa238a828a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa238a82a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa238a60082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2174==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 162 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3984803134 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2190==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff56ba4520 T2190) Step #5: ==2190==The signal is caused by a READ memory access. Step #5: ==2190==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f38d98a58a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f38d98a5a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f38d9883082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2190==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 163 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3985687118 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2206==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff10e604e0 T2206) Step #5: ==2206==The signal is caused by a READ memory access. Step #5: ==2206==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fb2648b38a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fb2648b3a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fb264891082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2206==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 164 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3986563428 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2222==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd9d05cfa0 T2222) Step #5: ==2222==The signal is caused by a READ memory access. Step #5: ==2222==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdc9aa958a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdc9aa95a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdc9aa73082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2222==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 165 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3987440262 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2238==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc1751e900 T2238) Step #5: ==2238==The signal is caused by a READ memory access. Step #5: ==2238==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f980bfd88a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f980bfd8a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f980bfb6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2238==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 166 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3988309695 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2254==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc06d41dc0 T2254) Step #5: ==2254==The signal is caused by a READ memory access. Step #5: ==2254==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f214dc228a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f214dc22a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f214dc00082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2254==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 167 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3989185133 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2270==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd132bdc90 T2270) Step #5: ==2270==The signal is caused by a READ memory access. Step #5: ==2270==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f755af388a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f755af38a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f755af16082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2270==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 168 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3990064918 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2286==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc2f275090 T2286) Step #5: ==2286==The signal is caused by a READ memory access. Step #5: ==2286==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7c908218a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7c90821a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7c907ff082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2286==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 169 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3990941833 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2302==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffea7692720 T2302) Step #5: ==2302==The signal is caused by a READ memory access. Step #5: ==2302==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa50ed7a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa50ed7aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa50ed58082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2302==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 170 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3991823478 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2318==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffee522e2e0 T2318) Step #5: ==2318==The signal is caused by a READ memory access. Step #5: ==2318==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f9deb6ff8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f9deb6ffa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9deb6dd082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2318==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 171 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3992694478 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2334==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe61381a70 T2334) Step #5: ==2334==The signal is caused by a READ memory access. Step #5: ==2334==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5ca782e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5ca782ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5ca780c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2334==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 172 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3993570338 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2350==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff69369860 T2350) Step #5: ==2350==The signal is caused by a READ memory access. Step #5: ==2350==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f19e848c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f19e848ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f19e846a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2350==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 173 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3994448064 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2366==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff376bff20 T2366) Step #5: ==2366==The signal is caused by a READ memory access. Step #5: ==2366==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f073955e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f073955ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f073953c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2366==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 174 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3995324424 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2382==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc230f6930 T2382) Step #5: ==2382==The signal is caused by a READ memory access. Step #5: ==2382==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0a40a6c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0a40a6ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0a40a4a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2382==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 175 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3996196775 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2398==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff41792e00 T2398) Step #5: ==2398==The signal is caused by a READ memory access. Step #5: ==2398==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f8debb118a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8debb11a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f8debaef082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2398==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 176 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3997072597 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2414==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff77f31780 T2414) Step #5: ==2414==The signal is caused by a READ memory access. Step #5: ==2414==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7b24fdf8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7b24fdfa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7b24fbd082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2414==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 177 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3997950796 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2428==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffa7798f20 T2428) Step #5: ==2428==The signal is caused by a READ memory access. Step #5: ==2428==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f87e0c9c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f87e0c9ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f87e0c7a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2428==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 178 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3998823690 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2442==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffce7b94900 T2442) Step #5: ==2442==The signal is caused by a READ memory access. Step #5: ==2442==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f375e5138a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f375e513a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f375e4f1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2442==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 179 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3999693900 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2458==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff420fc870 T2458) Step #5: ==2458==The signal is caused by a READ memory access. Step #5: ==2458==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f72882228a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7288222a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7288200082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2458==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 180 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4000572989 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2474==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffe1a8a320 T2474) Step #5: ==2474==The signal is caused by a READ memory access. Step #5: ==2474==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7eff49a9c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7eff49a9ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7eff49a7a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2474==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 181 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4001444913 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2490==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd9be46040 T2490) Step #5: ==2490==The signal is caused by a READ memory access. Step #5: ==2490==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f147214a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f147214aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1472128082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2490==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 182 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4002322787 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2506==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcea3bb490 T2506) Step #5: ==2506==The signal is caused by a READ memory access. Step #5: ==2506==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5a7add38a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5a7add3a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5a7adb1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2506==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 183 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4003202505 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2522==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff99894e10 T2522) Step #5: ==2522==The signal is caused by a READ memory access. Step #5: ==2522==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f511d91a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f511d91aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f511d8f8082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2522==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 184 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4004082602 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2538==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe8f43b550 T2538) Step #5: ==2538==The signal is caused by a READ memory access. Step #5: ==2538==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff5ce02c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff5ce02ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff5ce00a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2538==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 185 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4004948997 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2554==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcb40ce790 T2554) Step #5: ==2554==The signal is caused by a READ memory access. Step #5: ==2554==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f13b2b5c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f13b2b5ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f13b2b3a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2554==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 186 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4005820814 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2569==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffba511990 T2569) Step #5: ==2569==The signal is caused by a READ memory access. Step #5: ==2569==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa0134958a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa013495a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa013473082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2569==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 187 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4006697332 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2583==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd48ced530 T2583) Step #5: ==2583==The signal is caused by a READ memory access. Step #5: ==2583==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5872f9a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5872f9aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5872f78082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2583==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 188 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4007571251 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2597==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffde17c6750 T2597) Step #5: ==2597==The signal is caused by a READ memory access. Step #5: ==2597==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f55701dd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f55701dda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f55701bb082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2597==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 189 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4008447898 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2612==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc83abfde0 T2612) Step #5: ==2612==The signal is caused by a READ memory access. Step #5: ==2612==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe31b7598a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe31b759a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe31b737082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2612==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 190 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4009323857 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2628==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe24e34e20 T2628) Step #5: ==2628==The signal is caused by a READ memory access. Step #5: ==2628==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5d48ef58a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5d48ef5a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5d48ed3082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2628==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 191 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4010202356 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2644==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff9d118f40 T2644) Step #5: ==2644==The signal is caused by a READ memory access. Step #5: ==2644==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd69b47f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd69b47fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd69b45d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2644==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 192 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4011079962 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2658==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff5d48a400 T2658) Step #5: ==2658==The signal is caused by a READ memory access. Step #5: ==2658==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fe845f538a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fe845f53a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fe845f31082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2658==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 193 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4011948533 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2674==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcb806a660 T2674) Step #5: ==2674==The signal is caused by a READ memory access. Step #5: ==2674==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fbcf63618a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fbcf6361a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fbcf633f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2674==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 194 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4012827450 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2690==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc1c4026e0 T2690) Step #5: ==2690==The signal is caused by a READ memory access. Step #5: ==2690==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0c5f84a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0c5f84aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0c5f828082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2690==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 195 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4013696414 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2706==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff6fcaa3a0 T2706) Step #5: ==2706==The signal is caused by a READ memory access. Step #5: ==2706==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f44b28ec8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f44b28eca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f44b28ca082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2706==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 196 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4014571094 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2722==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc5e2aa6c0 T2722) Step #5: ==2722==The signal is caused by a READ memory access. Step #5: ==2722==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff51a0a88a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff51a0a8a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff51a086082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2722==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 197 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4015446677 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2738==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdb4078e60 T2738) Step #5: ==2738==The signal is caused by a READ memory access. Step #5: ==2738==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd754b798a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd754b79a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd754b57082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2738==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 198 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4016317694 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2754==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffea5144150 T2754) Step #5: ==2754==The signal is caused by a READ memory access. Step #5: ==2754==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f8e252198a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8e25219a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f8e251f7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2754==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 199 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4017189994 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2770==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff99af12e0 T2770) Step #5: ==2770==The signal is caused by a READ memory access. Step #5: ==2770==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdf868b68a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdf868b6a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdf86894082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2770==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 200 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4018065062 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2786==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffda60aaa20 T2786) Step #5: ==2786==The signal is caused by a READ memory access. Step #5: ==2786==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f74779e48a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f74779e4a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f74779c2082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2786==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 201 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4018938336 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2802==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdaeda2700 T2802) Step #5: ==2802==The signal is caused by a READ memory access. Step #5: ==2802==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa3254788a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa325478a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa325456082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2802==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 202 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4019817085 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2818==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe16bacf20 T2818) Step #5: ==2818==The signal is caused by a READ memory access. Step #5: ==2818==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdfa57c68a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdfa57c6a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdfa57a4082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2818==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 203 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4020692490 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2834==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffea5577cf0 T2834) Step #5: ==2834==The signal is caused by a READ memory access. Step #5: ==2834==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4332d4a8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4332d4aa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4332d28082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2834==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 204 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4021560903 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2850==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd60cc2730 T2850) Step #5: ==2850==The signal is caused by a READ memory access. Step #5: ==2850==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f3f0c51d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3f0c51da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f3f0c4fb082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2850==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 205 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4022432340 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2864==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe54ecc530 T2864) Step #5: ==2864==The signal is caused by a READ memory access. Step #5: ==2864==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1acd4d28a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1acd4d2a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1acd4b0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2864==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 206 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4023303657 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2878==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffee2c7dfa0 T2878) Step #5: ==2878==The signal is caused by a READ memory access. Step #5: ==2878==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7881b398a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7881b39a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7881b17082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2878==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 207 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4024184678 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2894==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc53fa3110 T2894) Step #5: ==2894==The signal is caused by a READ memory access. Step #5: ==2894==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1a8bc728a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1a8bc72a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1a8bc50082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2894==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 208 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4025062733 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2910==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff05c73fc0 T2910) Step #5: ==2910==The signal is caused by a READ memory access. Step #5: ==2910==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f02027128a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0202712a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f02026f0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2910==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 209 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4025939795 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2926==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe5de95ee0 T2926) Step #5: ==2926==The signal is caused by a READ memory access. Step #5: ==2926==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd3d77e18a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd3d77e1a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd3d77bf082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2926==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 210 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4026812404 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2942==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd266c7950 T2942) Step #5: ==2942==The signal is caused by a READ memory access. Step #5: ==2942==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1423e988a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1423e98a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1423e76082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2942==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 211 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4027686265 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2958==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffefb9c1170 T2958) Step #5: ==2958==The signal is caused by a READ memory access. Step #5: ==2958==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f3645afd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3645afda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f3645adb082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2958==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 212 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4028555626 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2974==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc6784cc10 T2974) Step #5: ==2974==The signal is caused by a READ memory access. Step #5: ==2974==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f8c3c0378a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8c3c037a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f8c3c015082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2974==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 213 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4029430394 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==2990==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffff7f31f50 T2990) Step #5: ==2990==The signal is caused by a READ memory access. Step #5: ==2990==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fca096768a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fca09676a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fca09654082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==2990==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 214 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4030302367 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3006==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff6a986b00 T3006) Step #5: ==3006==The signal is caused by a READ memory access. Step #5: ==3006==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd27c7208a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd27c720a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd27c6fe082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3006==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 215 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031175123 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3022==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffedb91290 T3022) Step #5: ==3022==The signal is caused by a READ memory access. Step #5: ==3022==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f02f84ad8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f02f84ada5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f02f848b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3022==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 216 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032049591 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3038==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcd875c210 T3038) Step #5: ==3038==The signal is caused by a READ memory access. Step #5: ==3038==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdb3cd3e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdb3cd3ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdb3cd1c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3038==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 217 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032932028 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3054==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd3447e0a0 T3054) Step #5: ==3054==The signal is caused by a READ memory access. Step #5: ==3054==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f00a08968a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f00a0896a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f00a0874082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3054==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 218 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033804872 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3070==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffe8b605f0 T3070) Step #5: ==3070==The signal is caused by a READ memory access. Step #5: ==3070==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f6f2a1ed8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6f2a1eda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6f2a1cb082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3070==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 219 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034684822 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3086==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff063625e0 T3086) Step #5: ==3086==The signal is caused by a READ memory access. Step #5: ==3086==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f2e841ef8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f2e841efa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f2e841cd082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3086==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 220 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4035555466 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3102==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffdfd67780 T3102) Step #5: ==3102==The signal is caused by a READ memory access. Step #5: ==3102==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdc884e98a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdc884e9a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdc884c7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3102==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 221 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4036426970 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3118==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdff5bd360 T3118) Step #5: ==3118==The signal is caused by a READ memory access. Step #5: ==3118==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fef1dd388a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fef1dd38a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fef1dd16082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3118==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 222 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4037302267 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3134==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc76c1cad0 T3134) Step #5: ==3134==The signal is caused by a READ memory access. Step #5: ==3134==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f6a8677b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6a8677ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6a86759082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3134==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 223 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4038178923 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3149==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff27875330 T3149) Step #5: ==3149==The signal is caused by a READ memory access. Step #5: ==3149==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fb0d0e528a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fb0d0e52a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fb0d0e30082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3149==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 224 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4039057600 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3162==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe6271d540 T3162) Step #5: ==3162==The signal is caused by a READ memory access. Step #5: ==3162==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fde94a678a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fde94a67a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fde94a45082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3162==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 225 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4039931749 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3178==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffea1ecdf20 T3178) Step #5: ==3178==The signal is caused by a READ memory access. Step #5: ==3178==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f8694de78a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8694de7a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f8694dc5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3178==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 226 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4040799507 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3194==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcf96b1490 T3194) Step #5: ==3194==The signal is caused by a READ memory access. Step #5: ==3194==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7c312948a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7c31294a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7c31272082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3194==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 227 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4041668252 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3210==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc1aff6490 T3210) Step #5: ==3210==The signal is caused by a READ memory access. Step #5: ==3210==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f0608e6c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f0608e6ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f0608e4a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3210==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 228 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4042545488 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3226==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdfe786020 T3226) Step #5: ==3226==The signal is caused by a READ memory access. Step #5: ==3226==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f7c3f8828a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f7c3f882a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f7c3f860082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3226==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 229 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4043421322 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3242==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdea6e8a50 T3242) Step #5: ==3242==The signal is caused by a READ memory access. Step #5: ==3242==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f92631ae8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f92631aea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f926318c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3242==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 230 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4044294984 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3258==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc23aa6fc0 T3258) Step #5: ==3258==The signal is caused by a READ memory access. Step #5: ==3258==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc7edecb8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc7edecba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc7edea9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3258==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 231 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4045175160 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3274==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc887cbdf0 T3274) Step #5: ==3274==The signal is caused by a READ memory access. Step #5: ==3274==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f3e5cbd38a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3e5cbd3a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f3e5cbb1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3274==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 232 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4046053518 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3290==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe04e33e20 T3290) Step #5: ==3290==The signal is caused by a READ memory access. Step #5: ==3290==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdfa95e98a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdfa95e9a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdfa95c7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3290==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 233 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4046921061 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3304==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff7c0777e0 T3304) Step #5: ==3304==The signal is caused by a READ memory access. Step #5: ==3304==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f23e86078a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f23e8607a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f23e85e5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3304==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 234 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4047801513 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3318==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd94e88560 T3318) Step #5: ==3318==The signal is caused by a READ memory access. Step #5: ==3318==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc79469b8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc79469ba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc794679082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3318==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 235 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4048676671 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3334==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe36546910 T3334) Step #5: ==3334==The signal is caused by a READ memory access. Step #5: ==3334==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f9433ca28a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f9433ca2a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9433c80082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3334==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 236 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4049549563 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3350==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe85426e00 T3350) Step #5: ==3350==The signal is caused by a READ memory access. Step #5: ==3350==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4088d438a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4088d43a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4088d21082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3350==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 237 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4050433123 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3366==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdcd6cc980 T3366) Step #5: ==3366==The signal is caused by a READ memory access. Step #5: ==3366==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fbd41af78a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fbd41af7a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fbd41ad5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3366==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 238 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4051303831 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3382==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc3fe60d60 T3382) Step #5: ==3382==The signal is caused by a READ memory access. Step #5: ==3382==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fb571fc78a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fb571fc7a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fb571fa5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3382==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 239 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4052173597 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3398==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd60774de0 T3398) Step #5: ==3398==The signal is caused by a READ memory access. Step #5: ==3398==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f92345ab8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f92345aba5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f9234589082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3398==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 240 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4053054291 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3414==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffc5332e70 T3414) Step #5: ==3414==The signal is caused by a READ memory access. Step #5: ==3414==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7faf8a96e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7faf8a96ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7faf8a94c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3414==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 241 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4053931045 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3430==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffb7a88520 T3430) Step #5: ==3430==The signal is caused by a READ memory access. Step #5: ==3430==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f490ae188a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f490ae18a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f490adf6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3430==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 242 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4054809406 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3446==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffee7ed54e0 T3446) Step #5: ==3446==The signal is caused by a READ memory access. Step #5: ==3446==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f02079cd8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f02079cda5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f02079ab082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3446==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 243 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4055679883 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3462==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffeea4a3900 T3462) Step #5: ==3462==The signal is caused by a READ memory access. Step #5: ==3462==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f6a824818a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6a82481a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6a8245f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3462==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 244 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4056557346 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3478==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc61dec260 T3478) Step #5: ==3478==The signal is caused by a READ memory access. Step #5: ==3478==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5772c488a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5772c48a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5772c26082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3478==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 245 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4057429902 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3494==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc31374930 T3494) Step #5: ==3494==The signal is caused by a READ memory access. Step #5: ==3494==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f333cd038a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f333cd03a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f333cce1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3494==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 246 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4058308743 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3510==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe9c005760 T3510) Step #5: ==3510==The signal is caused by a READ memory access. Step #5: ==3510==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fbdac8f08a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fbdac8f0a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fbdac8ce082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3510==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 247 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4059175844 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3526==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffed3fe7bf0 T3526) Step #5: ==3526==The signal is caused by a READ memory access. Step #5: ==3526==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f02a4bc48a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f02a4bc4a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f02a4ba2082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3526==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 248 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4060047338 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3542==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe8e5d14e0 T3542) Step #5: ==3542==The signal is caused by a READ memory access. Step #5: ==3542==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4d2a9f08a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4d2a9f0a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4d2a9ce082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3542==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 249 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4060919700 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3558==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc6f35ea50 T3558) Step #5: ==3558==The signal is caused by a READ memory access. Step #5: ==3558==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fcda2bf98a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fcda2bf9a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fcda2bd7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3558==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 250 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4061795525 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3574==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd62055f90 T3574) Step #5: ==3574==The signal is caused by a READ memory access. Step #5: ==3574==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f86a10028a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f86a1002a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f86a0fe0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3574==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 251 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4062673407 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3590==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd47e89d40 T3590) Step #5: ==3590==The signal is caused by a READ memory access. Step #5: ==3590==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f42b26d38a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f42b26d3a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f42b26b1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3590==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 252 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4063543388 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3606==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe7f86d880 T3606) Step #5: ==3606==The signal is caused by a READ memory access. Step #5: ==3606==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f11f490c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f11f490ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f11f48ea082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3606==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 253 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4064416588 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3622==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd1fa1ac30 T3622) Step #5: ==3622==The signal is caused by a READ memory access. Step #5: ==3622==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f20a4f108a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f20a4f10a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f20a4eee082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3622==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 254 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4065290960 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3638==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe282b8d50 T3638) Step #5: ==3638==The signal is caused by a READ memory access. Step #5: ==3638==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f1957d3d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f1957d3da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f1957d1b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3638==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 255 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4066168645 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3654==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffeee53e8b0 T3654) Step #5: ==3654==The signal is caused by a READ memory access. Step #5: ==3654==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f53bbd388a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f53bbd38a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f53bbd16082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3654==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 256 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4067046860 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3670==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffd9c78830 T3670) Step #5: ==3670==The signal is caused by a READ memory access. Step #5: ==3670==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc39ef178a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc39ef17a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc39eef5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3670==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 257 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4067925936 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3686==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdc6ae1a60 T3686) Step #5: ==3686==The signal is caused by a READ memory access. Step #5: ==3686==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f8e8a0088a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f8e8a008a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f8e89fe6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3686==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 258 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4068803577 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3701==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff8af225f0 T3701) Step #5: ==3701==The signal is caused by a READ memory access. Step #5: ==3701==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f769e97f8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f769e97fa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f769e95d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3701==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 259 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4069680446 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3716==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe7f3fad20 T3716) Step #5: ==3716==The signal is caused by a READ memory access. Step #5: ==3716==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc8371248a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc837124a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc837102082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3716==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 260 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4070555753 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3730==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe610c7670 T3730) Step #5: ==3730==The signal is caused by a READ memory access. Step #5: ==3730==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f22df9288a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f22df928a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f22df906082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3730==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 261 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4071425713 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3746==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffcf2ca6360 T3746) Step #5: ==3746==The signal is caused by a READ memory access. Step #5: ==3746==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f5ac52c58a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f5ac52c5a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f5ac52a3082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3746==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 262 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4072301456 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3760==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffc818ac0a0 T3760) Step #5: ==3760==The signal is caused by a READ memory access. Step #5: ==3760==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff9a22a58a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff9a22a5a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff9a2283082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3760==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 263 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4073177849 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3774==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffde2c174b0 T3774) Step #5: ==3774==The signal is caused by a READ memory access. Step #5: ==3774==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fc72d7b98a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fc72d7b9a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fc72d797082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3774==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 264 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4074049560 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3790==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdbcd27270 T3790) Step #5: ==3790==The signal is caused by a READ memory access. Step #5: ==3790==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f6a02bbf8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f6a02bbfa5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f6a02b9d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3790==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 265 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4074926427 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3806==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff2dc58560 T3806) Step #5: ==3806==The signal is caused by a READ memory access. Step #5: ==3806==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fa0dde348a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fa0dde34a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fa0dde12082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3806==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 266 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4075802534 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3822==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fffba8b39b0 T3822) Step #5: ==3822==The signal is caused by a READ memory access. Step #5: ==3822==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd69754c8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd69754ca5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd69752a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3822==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 267 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4076678018 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3838==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff3bd2ab60 T3838) Step #5: ==3838==The signal is caused by a READ memory access. Step #5: ==3838==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fdeb409e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fdeb409ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fdeb407c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3838==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 268 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4077553412 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3854==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd66374190 T3854) Step #5: ==3854==The signal is caused by a READ memory access. Step #5: ==3854==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f2513a4e8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f2513a4ea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f2513a2c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3854==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 269 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4078431266 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 32Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3870==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffee14f7840 T3870) Step #5: ==3870==The signal is caused by a READ memory access. Step #5: ==3870==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff5ee4ae8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff5ee4aea5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff5ee48c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3870==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 270 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4079304615 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3886==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffdabfd4140 T3886) Step #5: ==3886==The signal is caused by a READ memory access. Step #5: ==3886==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7fd48ec4d8a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7fd48ec4da5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7fd48ec2b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3886==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 271 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4080179806 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3902==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7fff96a0cf10 T3902) Step #5: ==3902==The signal is caused by a READ memory access. Step #5: ==3902==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f3a50c408a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f3a50c40a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f3a50c1e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3902==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 272 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4081051248 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3918==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffeb975c1b0 T3918) Step #5: ==3918==The signal is caused by a READ memory access. Step #5: ==3918==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f4d07f298a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f4d07f29a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f4d07f07082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3918==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 273 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4081917651 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3934==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffd16ed8060 T3934) Step #5: ==3934==The signal is caused by a READ memory access. Step #5: ==3934==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7f85591d68a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7f85591d6a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7f85591b4082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _start (out/libfuzzer-coverage-x86_64/ospfd+0x4321bd) Step #5: Step #5: DEDUP_TOKEN: __llvm_write_binary_ids--lprofWriteDataImpl--lprofWriteData Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) in __llvm_write_binary_ids Step #5: ==3934==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: MERGE-OUTER: attempt 274 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4082795018 Step #5: INFO: Loaded 1 modules (44899 inline 8-bit counters): 44899 [0x97dd90, 0x988cf3), Step #5: INFO: Loaded 1 PC tables (44899 PCs): 44899 [0x7c5128,0x874758), Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge43.txt' Step #5: MERGE-INNER: 3237 total files; 3237 processed earlier; will process 0 files now Step #5: #0 DONE exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==3950==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x0000006bc821 bp 0x000000037280 sp 0x7ffe2f0a97f0 T3950) Step #5: ==3950==The signal is caused by a READ memory access. Step #5: ==3950==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x6bc821 in __llvm_write_binary_ids (out/libfuzzer-coverage-x86_64/ospfd+0x6bc821) Step #5: #1 0x6bbcb6 in lprofWriteDataImpl (out/libfuzzer-coverage-x86_64/ospfd+0x6bbcb6) Step #5: #2 0x6bbb6b in lprofWriteData (out/libfuzzer-coverage-x86_64/ospfd+0x6bbb6b) Step #5: #3 0x6ba6bd in writeFile InstrProfilingFile.c Step #5: #4 0x6ba421 in __llvm_profile_write_file (out/libfuzzer-coverage-x86_64/ospfd+0x6ba421) Step #5: #5 0x7ff93deb08a6 (/lib/x86_64-linux-gnu/libc.so.6+0x468a6) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #6 0x7ff93deb0a5f in exit (/lib/x86_64-linux-gnu/libc.so.6+0x46a5f) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #7 0x441738 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:5 Step #5: #8 0x46add2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #9 0x7ff93de8e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: e678fe54a5d2c2092f8e47eb0b33105e380f7340) Step #5: #10 0x4321bd in _st