starting build "69ca68a9-f639-4a03-9842-ebf1b846f80a" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 51df0d6876cd: Pulling fs layer Step #1: 38da3118a46e: Pulling fs layer Step #1: ec67c84a6d76: Pulling fs layer Step #1: 8bb7dd1116ca: Pulling fs layer Step #1: 1fb4fb3d2b01: Pulling fs layer Step #1: a7d3a0578149: Pulling fs layer Step #1: 23e3013e5b98: Pulling fs layer Step #1: 50e1ee57936a: Pulling fs layer Step #1: b46b6cdbb6f2: Pulling fs layer Step #1: c0d18e8fb1fa: Pulling fs layer Step #1: 29a663a40ba4: Pulling fs layer Step #1: d57e2535d3c0: Pulling fs layer Step #1: e530a9eecf2b: Pulling fs layer Step #1: 4f27abcdaf5d: Pulling fs layer Step #1: 81adce140048: Pulling fs layer Step #1: 1eaaa1542342: Pulling fs layer Step #1: 6becd2001539: Pulling fs layer Step #1: 22d4835417b0: Pulling fs layer Step #1: 23e3013e5b98: Waiting Step #1: 601a9cbfd137: Pulling fs layer Step #1: a7d3a0578149: Waiting Step #1: 972df7da24e8: Pulling fs layer Step #1: b46b6cdbb6f2: Waiting Step #1: 535ecd0613d1: Pulling fs layer Step #1: 50e1ee57936a: Waiting Step #1: 16949380c6e4: Pulling fs layer Step #1: da4104990ff0: Pulling fs layer Step #1: c0d18e8fb1fa: Waiting Step #1: c19b7fe83e8a: Pulling fs layer Step #1: 6becd2001539: Waiting Step #1: 3c6277aa8e2b: Pulling fs layer Step #1: 29a663a40ba4: Waiting Step #1: bcf869ca811e: Pulling fs layer Step #1: 81adce140048: Waiting Step #1: 4a49dc7a9851: Pulling fs layer Step #1: de9ad109123c: Pulling fs layer Step #1: 1eaaa1542342: Waiting Step #1: 8bb7dd1116ca: Waiting Step #1: d74dccfeea37: Pulling fs layer Step #1: 9650ce23f886: Pulling fs layer Step #1: ec67c84a6d76: Waiting Step #1: d57e2535d3c0: Waiting Step #1: 1fb4fb3d2b01: Waiting Step #1: eaeb815cd75a: Pulling fs layer Step #1: 3ccdc7b565ee: Pulling fs layer Step #1: 11c03f65d6c1: Pulling fs layer Step #1: 22d4835417b0: Waiting Step #1: 601a9cbfd137: Waiting Step #1: e530a9eecf2b: Waiting Step #1: 535ecd0613d1: Waiting Step #1: c19b7fe83e8a: Waiting Step #1: 972df7da24e8: Waiting Step #1: 16949380c6e4: Waiting Step #1: 9650ce23f886: Waiting Step #1: da4104990ff0: Waiting Step #1: 3c6277aa8e2b: Waiting Step #1: 11c03f65d6c1: Waiting Step #1: eaeb815cd75a: Waiting Step #1: bcf869ca811e: Waiting Step #1: d74dccfeea37: Waiting Step #1: 3ccdc7b565ee: Waiting Step #1: 4f27abcdaf5d: Waiting Step #1: 4a49dc7a9851: Waiting Step #1: 38da3118a46e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 8bb7dd1116ca: Verifying Checksum Step #1: 8bb7dd1116ca: Download complete Step #1: 1fb4fb3d2b01: Download complete Step #1: ec67c84a6d76: Verifying Checksum Step #1: ec67c84a6d76: Download complete Step #1: 51df0d6876cd: Verifying Checksum Step #1: 51df0d6876cd: Download complete Step #1: 23e3013e5b98: Download complete Step #1: 50e1ee57936a: Download complete Step #1: b549f31133a9: Pull complete Step #1: c0d18e8fb1fa: Verifying Checksum Step #1: c0d18e8fb1fa: Download complete Step #1: 29a663a40ba4: Verifying Checksum Step #1: 29a663a40ba4: Download complete Step #1: d57e2535d3c0: Download complete Step #1: e530a9eecf2b: Verifying Checksum Step #1: e530a9eecf2b: Download complete Step #1: 4f27abcdaf5d: Verifying Checksum Step #1: 4f27abcdaf5d: Download complete Step #1: 81adce140048: Verifying Checksum Step #1: 81adce140048: Download complete Step #1: b46b6cdbb6f2: Verifying Checksum Step #1: b46b6cdbb6f2: Download complete Step #1: 1eaaa1542342: Verifying Checksum Step #1: 1eaaa1542342: Download complete Step #1: 6becd2001539: Verifying Checksum Step #1: 6becd2001539: Download complete Step #1: 22d4835417b0: Verifying Checksum Step #1: 22d4835417b0: Download complete Step #1: 601a9cbfd137: Verifying Checksum Step #1: 601a9cbfd137: Download complete Step #1: 972df7da24e8: Verifying Checksum Step #1: 972df7da24e8: Download complete Step #1: 535ecd0613d1: Verifying Checksum Step #1: 535ecd0613d1: Download complete Step #1: da4104990ff0: Verifying Checksum Step #1: da4104990ff0: Download complete Step #1: 16949380c6e4: Verifying Checksum Step #1: 16949380c6e4: Download complete Step #1: c19b7fe83e8a: Verifying Checksum Step #1: c19b7fe83e8a: Download complete Step #1: 3c6277aa8e2b: Verifying Checksum Step #1: 3c6277aa8e2b: Download complete Step #1: a7d3a0578149: Verifying Checksum Step #1: a7d3a0578149: Download complete Step #1: bcf869ca811e: Verifying Checksum Step #1: bcf869ca811e: Download complete Step #1: 4a49dc7a9851: Verifying Checksum Step #1: 4a49dc7a9851: Download complete Step #1: de9ad109123c: Verifying Checksum Step #1: de9ad109123c: Download complete Step #1: 9650ce23f886: Download complete Step #1: d74dccfeea37: Verifying Checksum Step #1: d74dccfeea37: Download complete Step #1: eaeb815cd75a: Download complete Step #1: 3ccdc7b565ee: Download complete Step #1: 11c03f65d6c1: Download complete Step #1: 51df0d6876cd: Pull complete Step #1: 38da3118a46e: Pull complete Step #1: ec67c84a6d76: Pull complete Step #1: 8bb7dd1116ca: Pull complete Step #1: 1fb4fb3d2b01: Pull complete Step #1: a7d3a0578149: Pull complete Step #1: 23e3013e5b98: Pull complete Step #1: 50e1ee57936a: Pull complete Step #1: b46b6cdbb6f2: Pull complete Step #1: c0d18e8fb1fa: Pull complete Step #1: 29a663a40ba4: Pull complete Step #1: d57e2535d3c0: Pull complete Step #1: e530a9eecf2b: Pull complete Step #1: 4f27abcdaf5d: Pull complete Step #1: 81adce140048: Pull complete Step #1: 1eaaa1542342: Pull complete Step #1: 6becd2001539: Pull complete Step #1: 22d4835417b0: Pull complete Step #1: 601a9cbfd137: Pull complete Step #1: 972df7da24e8: Pull complete Step #1: 535ecd0613d1: Pull complete Step #1: 16949380c6e4: Pull complete Step #1: da4104990ff0: Pull complete Step #1: c19b7fe83e8a: Pull complete Step #1: 3c6277aa8e2b: Pull complete Step #1: bcf869ca811e: Pull complete Step #1: 4a49dc7a9851: Pull complete Step #1: de9ad109123c: Pull complete Step #1: d74dccfeea37: Pull complete Step #1: 9650ce23f886: Pull complete Step #1: eaeb815cd75a: Pull complete Step #1: 3ccdc7b565ee: Pull complete Step #1: 11c03f65d6c1: Pull complete Step #1: Digest: sha256:718d1e1f9fed057967ab647b50af41708389951cff904f6fdaac999ad1b3973e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 01958c5bb573 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y make cmake Step #1: ---> Running in a37d9bdc0a52 Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (214 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: Suggested packages: Step #1: cmake-doc ninja-build lrzip Step #1: The following NEW packages will be installed: Step #1: cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 15.0 MB of archives. Step #1: After this operation, 65.0 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.4 [327 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 15.0 MB in 1s (28.6 MB/s) Step #1: Selecting previously unselected package libicu66:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.4_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container a37d9bdc0a52 Step #1: ---> fd40537683ef Step #1: Step 3/5 : RUN git clone https://github.com/danielaparker/jsoncons Step #1: ---> Running in 212d0c5616fd Step #1: Cloning into 'jsoncons'... Step #1: Removing intermediate container 212d0c5616fd Step #1: ---> 677bd7f94a98 Step #1: Step 4/5 : WORKDIR $SRC Step #1: ---> Running in b4ba6830b546 Step #1: Removing intermediate container b4ba6830b546 Step #1: ---> d656e69f3c45 Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> 53e996092223 Step #1: Successfully built 53e996092223 Step #1: Successfully tagged gcr.io/oss-fuzz/jsoncons:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/jsoncons Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileEKw9PM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/jsoncons/.git Step #2 - "srcmap": + GIT_DIR=/src/jsoncons Step #2 - "srcmap": + cd /src/jsoncons Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/danielaparker/jsoncons Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=b885214393675eed3176a9310885e46935267bb5 Step #2 - "srcmap": + jq_inplace /tmp/fileEKw9PM '."/src/jsoncons" = { type: "git", url: "https://github.com/danielaparker/jsoncons", rev: "b885214393675eed3176a9310885e46935267bb5" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileIHEtLc Step #2 - "srcmap": + cat /tmp/fileEKw9PM Step #2 - "srcmap": + jq '."/src/jsoncons" = { type: "git", url: "https://github.com/danielaparker/jsoncons", rev: "b885214393675eed3176a9310885e46935267bb5" }' Step #2 - "srcmap": + mv /tmp/fileIHEtLc /tmp/fileEKw9PM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileEKw9PM Step #2 - "srcmap": + rm /tmp/fileEKw9PM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/jsoncons": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/danielaparker/jsoncons", Step #2 - "srcmap": "rev": "b885214393675eed3176a9310885e46935267bb5" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-afl-address-x86_64" Step #3 - "compile-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-afl-address-x86_64": Copying precompiled AFL++ Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": AFL++ target compilation setup: Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #3 - "compile-afl-address-x86_64": AFL_QUIET=1 Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": done. Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": CC=/src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": CXX=/src/aflplusplus/afl-clang-fast++ Step #3 - "compile-afl-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope Step #3 - "compile-afl-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ Step #3 - "compile-afl-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": + cd jsoncons/fuzzers Step #3 - "compile-afl-address-x86_64": + chmod +x ./build_fuzzers.sh Step #3 - "compile-afl-address-x86_64": + ./build_fuzzers.sh Step #3 - "compile-afl-address-x86_64": Compiling the fuzzers Step #3 - "compile-afl-address-x86_64": ./fuzzers/fuzz_msgpack_encoder.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #3 - "compile-afl-address-x86_64": 4 | #include  Step #3 - "compile-afl-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-afl-address-x86_64": 1 error generated. Step #3 - "compile-afl-address-x86_64": ./fuzzers/fuzz_cbor_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #3 - "compile-afl-address-x86_64": 4 | #include  Step #3 - "compile-afl-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-afl-address-x86_64": 1 error generated. Step #3 - "compile-afl-address-x86_64": ./fuzzers/fuzz_msgpack_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #3 - "compile-afl-address-x86_64": 4 | #include  Step #3 - "compile-afl-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-afl-address-x86_64": 1 error generated. Finished Step #3 - "compile-afl-address-x86_64" Starting Step #4 - "build-check-afl-address-x86_64" Step #4 - "build-check-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-afl-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-afl-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-afl-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-afl-address-x86_64": 51df0d6876cd: Already exists Step #4 - "build-check-afl-address-x86_64": 38da3118a46e: Already exists Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": a6399624745a: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Waiting Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Waiting Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Waiting Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Waiting Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Waiting Step #4 - "build-check-afl-address-x86_64": a6399624745a: Waiting Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Waiting Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Waiting Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Waiting Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Waiting Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Waiting Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Waiting Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Waiting Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Download complete Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Download complete Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Download complete Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Download complete Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Pull complete Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Download complete Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Download complete Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Download complete Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Pull complete Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Download complete Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Pull complete Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Download complete Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Download complete Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Download complete Step #4 - "build-check-afl-address-x86_64": a6399624745a: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": a6399624745a: Download complete Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Download complete Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Download complete Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Download complete Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Download complete Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Download complete Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Pull complete Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Pull complete Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Pull complete Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Pull complete Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Pull complete Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Pull complete Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Pull complete Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Pull complete Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Pull complete Step #4 - "build-check-afl-address-x86_64": a6399624745a: Pull complete Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Pull complete Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Pull complete Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Pull complete Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Pull complete Step #4 - "build-check-afl-address-x86_64": Digest: sha256:cb894d78b81942499e77d79f91f562ce74c084f3ca1001f2c72a30e5404d1f69 Step #4 - "build-check-afl-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_json_encoder Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_csv Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_json_parser_max Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_ubjson_parser_max Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_cbor_encoder Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_ubjson Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_msgpack Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_parse Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_bson Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_csv_encoder Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_ubjson_encoder Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_json_cursor Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_bson_encoder Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_cbor Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp78ct1i6b/fuzz_bson_parser_max Finished Step #4 - "build-check-afl-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/jsoncons Step #6: adding: SanitizerCoverageLTO.so (deflated 70%) Step #6: adding: SanitizerCoveragePCGUARD.so (deflated 70%) Step #6: adding: afl-addseeds (deflated 56%) Step #6: adding: afl-analyze (deflated 54%) Step #6: adding: afl-as (deflated 63%) Step #6: adding: afl-c++ (deflated 57%) Step #6: adding: afl-c++.8 (deflated 56%) Step #6: adding: afl-cc (deflated 57%) Step #6: adding: afl-cc.8 (deflated 56%) Step #6: adding: afl-clang (deflated 57%) Step #6: adding: afl-clang++ (deflated 57%) Step #6: adding: afl-clang-fast (deflated 57%) Step #6: adding: afl-clang-fast++ (deflated 57%) Step #6: adding: afl-clang-fast++.8 (deflated 56%) Step #6: adding: afl-clang-fast.8 (deflated 56%) Step #6: adding: afl-clang-lto (deflated 57%) Step #6: adding: afl-clang-lto++ (deflated 57%) Step #6: adding: afl-clang-lto++.8 (deflated 56%) Step #6: adding: afl-clang-lto.8 (deflated 56%) Step #6: adding: afl-cmin (deflated 70%) Step #6: adding: afl-cmin.bash (deflated 65%) Step #6: adding: afl-compiler-rt-32.o (deflated 56%) Step #6: adding: afl-compiler-rt-64.o (deflated 67%) Step #6: adding: afl-compiler-rt.o (deflated 67%) Step #6: adding: afl-fuzz (deflated 55%) Step #6: adding: afl-g++ (deflated 57%) Step #6: adding: afl-gcc (deflated 57%) Step #6: adding: afl-gotcpu (deflated 61%) Step #6: adding: afl-ld-lto (deflated 63%) Step #6: adding: afl-llvm-dict2file.so (deflated 69%) Step #6: adding: afl-llvm-lto-instrumentlist.so (deflated 70%) Step #6: adding: afl-llvm-pass.so (deflated 68%) Step #6: adding: afl-llvm-rt-lto-32.o (deflated 21%) Step #6: adding: afl-llvm-rt-lto-64.o (deflated 20%) Step #6: adding: afl-llvm-rt-lto.o (deflated 20%) Step #6: adding: afl-lto (deflated 57%) Step #6: adding: afl-lto++ (deflated 57%) Step #6: adding: afl-lto++.8 (deflated 56%) Step #6: adding: afl-lto.8 (deflated 56%) Step #6: adding: afl-persistent-config (deflated 60%) Step #6: adding: afl-plot (deflated 65%) Step #6: adding: afl-showmap (deflated 55%) Step #6: adding: afl-system-config (deflated 63%) Step #6: adding: afl-tmin (deflated 54%) Step #6: adding: afl-whatsup (deflated 69%) Step #6: adding: afl-wine-trace (deflated 70%) Step #6: adding: afl_options.txt (deflated 20%) Step #6: adding: cmplog-instructions-pass.so (deflated 69%) Step #6: adding: cmplog-routines-pass.so (deflated 70%) Step #6: adding: cmplog-switches-pass.so (deflated 69%) Step #6: adding: compare-transform-pass.so (deflated 69%) Step #6: adding: dynamic_list.txt (deflated 76%) Step #6: adding: fuzz_bson (deflated 69%) Step #6: adding: fuzz_bson_encoder (deflated 67%) Step #6: adding: fuzz_bson_parser_max (deflated 67%) Step #6: adding: fuzz_cbor (deflated 69%) Step #6: adding: fuzz_cbor_encoder (deflated 68%) Step #6: adding: fuzz_csv (deflated 69%) Step #6: adding: fuzz_csv_encoder (deflated 68%) Step #6: adding: fuzz_json_cursor (deflated 67%) Step #6: adding: fuzz_json_encoder (deflated 67%) Step #6: adding: fuzz_json_parser_max (deflated 67%) Step #6: adding: fuzz_msgpack (deflated 69%) Step #6: adding: fuzz_parse (deflated 69%) Step #6: adding: fuzz_ubjson (deflated 69%) Step #6: adding: fuzz_ubjson_encoder (deflated 67%) Step #6: adding: fuzz_ubjson_parser_max (deflated 67%) Step #6: adding: libAFLDriver.a (deflated 64%) Step #6: adding: libAFLQemuDriver.a (deflated 64%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: split-compares-pass.so (deflated 68%) Step #6: adding: split-switches-pass.so (deflated 69%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 89257482f398: Waiting Step #7: 7eb39101e508: Waiting Step #7: 0062f774e994: Waiting Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 158 0 0 100 158 0 736 --:--:-- --:--:-- --:--:-- 738 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33.4M 0 0 100 33.4M 0 87.6M --:--:-- --:--:-- --:--:-- 87.9M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 238 0 0 100 238 0 714 --:--:-- --:--:-- --:--:-- 716 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 155 --:--:-- --:--:-- --:--:-- 157 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/jsoncons Finished Step #11 Starting Step #12 - "compile-honggfuzz-address-x86_64" Step #12 - "compile-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": vm.mmap_rnd_bits = 28 Step #12 - "compile-honggfuzz-address-x86_64": Skipping compilation; using precompiled honggfuzz Step #12 - "compile-honggfuzz-address-x86_64": done. Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": CC=clang Step #12 - "compile-honggfuzz-address-x86_64": CXX=clang++ Step #12 - "compile-honggfuzz-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp Step #12 - "compile-honggfuzz-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ Step #12 - "compile-honggfuzz-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": + cd jsoncons/fuzzers Step #12 - "compile-honggfuzz-address-x86_64": + chmod +x ./build_fuzzers.sh Step #12 - "compile-honggfuzz-address-x86_64": + ./build_fuzzers.sh Step #12 - "compile-honggfuzz-address-x86_64": Compiling the fuzzers Step #12 - "compile-honggfuzz-address-x86_64": ./fuzzers/fuzz_msgpack_encoder.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #12 - "compile-honggfuzz-address-x86_64": 4 | #include  Step #12 - "compile-honggfuzz-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #12 - "compile-honggfuzz-address-x86_64": 1 error generated. Step #12 - "compile-honggfuzz-address-x86_64": ./fuzzers/fuzz_cbor_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #12 - "compile-honggfuzz-address-x86_64": 4 | #include  Step #12 - "compile-honggfuzz-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #12 - "compile-honggfuzz-address-x86_64": 1 error generated. Step #12 - "compile-honggfuzz-address-x86_64": ./fuzzers/fuzz_msgpack_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #12 - "compile-honggfuzz-address-x86_64": 4 | #include  Step #12 - "compile-honggfuzz-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #12 - "compile-honggfuzz-address-x86_64": 1 error generated. Finished Step #12 - "compile-honggfuzz-address-x86_64" Starting Step #13 - "build-check-honggfuzz-address-x86_64" Step #13 - "build-check-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_json_encoder Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_csv Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_json_parser_max Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_ubjson_parser_max Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_cbor_encoder Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_parse Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_ubjson Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_msgpack Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_bson Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_csv_encoder Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_ubjson_encoder Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_json_cursor Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_bson_encoder Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_cbor Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppwaqkcrz/fuzz_bson_parser_max Finished Step #13 - "build-check-honggfuzz-address-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/jsoncons Step #15: adding: fuzz_bson (deflated 68%) Step #15: adding: fuzz_bson_encoder (deflated 67%) Step #15: adding: fuzz_bson_parser_max (deflated 67%) Step #15: adding: fuzz_cbor (deflated 67%) Step #15: adding: fuzz_cbor_encoder (deflated 67%) Step #15: adding: fuzz_csv (deflated 67%) Step #15: adding: fuzz_csv_encoder (deflated 66%) Step #15: adding: fuzz_json_cursor (deflated 67%) Step #15: adding: fuzz_json_encoder (deflated 67%) Step #15: adding: fuzz_json_parser_max (deflated 67%) Step #15: adding: fuzz_msgpack (deflated 67%) Step #15: adding: fuzz_parse (deflated 67%) Step #15: adding: fuzz_ubjson (deflated 68%) Step #15: adding: fuzz_ubjson_encoder (deflated 67%) Step #15: adding: fuzz_ubjson_parser_max (deflated 67%) Step #15: adding: honggfuzz (deflated 66%) Step #15: adding: llvm-symbolizer (deflated 66%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 158 0 0 100 158 0 675 --:--:-- --:--:-- --:--:-- 678 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 24.7M 0 0 100 24.7M 0 40.1M --:--:-- --:--:-- --:--:-- 40.2M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 238 0 0 100 238 0 646 --:--:-- --:--:-- --:--:-- 648 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 141 --:--:-- --:--:-- --:--:-- 142 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/jsoncons Finished Step #20 Starting Step #21 - "compile-libfuzzer-address-x86_64" Step #21 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #21 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": CC=clang Step #21 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #21 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #21 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #21 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": + cd jsoncons/fuzzers Step #21 - "compile-libfuzzer-address-x86_64": + chmod +x ./build_fuzzers.sh Step #21 - "compile-libfuzzer-address-x86_64": + ./build_fuzzers.sh Step #21 - "compile-libfuzzer-address-x86_64": Compiling the fuzzers Step #21 - "compile-libfuzzer-address-x86_64": ./fuzzers/fuzz_msgpack_encoder.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #21 - "compile-libfuzzer-address-x86_64": 4 | #include  Step #21 - "compile-libfuzzer-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #21 - "compile-libfuzzer-address-x86_64": 1 error generated. Step #21 - "compile-libfuzzer-address-x86_64": ./fuzzers/fuzz_cbor_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #21 - "compile-libfuzzer-address-x86_64": 4 | #include  Step #21 - "compile-libfuzzer-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #21 - "compile-libfuzzer-address-x86_64": 1 error generated. Step #21 - "compile-libfuzzer-address-x86_64": ./fuzzers/fuzz_msgpack_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #21 - "compile-libfuzzer-address-x86_64": 4 | #include  Step #21 - "compile-libfuzzer-address-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #21 - "compile-libfuzzer-address-x86_64": 1 error generated. Finished Step #21 - "compile-libfuzzer-address-x86_64" Starting Step #22 - "build-check-libfuzzer-address-x86_64" Step #22 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_json_encoder Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_csv Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_json_parser_max Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_ubjson_parser_max Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_cbor_encoder Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_parse Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_ubjson Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_msgpack Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_bson Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_csv_encoder Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_ubjson_encoder Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_json_cursor Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_bson_encoder Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_cbor Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpk8y9zu8o/fuzz_bson_parser_max Finished Step #22 - "build-check-libfuzzer-address-x86_64" Starting Step #23 Step #23: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #23 Starting Step #24 Step #24: Already have image: gcr.io/oss-fuzz/jsoncons Step #24: adding: fuzz_bson (deflated 68%) Step #24: adding: fuzz_bson_encoder (deflated 67%) Step #24: adding: fuzz_bson_parser_max (deflated 67%) Step #24: adding: fuzz_cbor (deflated 68%) Step #24: adding: fuzz_cbor_encoder (deflated 67%) Step #24: adding: fuzz_csv (deflated 68%) Step #24: adding: fuzz_csv_encoder (deflated 67%) Step #24: adding: fuzz_json_cursor (deflated 67%) Step #24: adding: fuzz_json_encoder (deflated 67%) Step #24: adding: fuzz_json_parser_max (deflated 67%) Step #24: adding: fuzz_msgpack (deflated 68%) Step #24: adding: fuzz_parse (deflated 67%) Step #24: adding: fuzz_ubjson (deflated 68%) Step #24: adding: fuzz_ubjson_encoder (deflated 67%) Step #24: adding: fuzz_ubjson_parser_max (deflated 67%) Step #24: adding: llvm-symbolizer (deflated 66%) Finished Step #24 Starting Step #25 Step #25: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #25: % Total % Received % Xferd Average Speed Time Time Time Current Step #25: Dload Upload Total Spent Left Speed Step #25: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 158 0 0 100 158 0 799 --:--:-- --:--:-- --:--:-- 802 Finished Step #25 Starting Step #26 Step #26: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #26: % Total % Received % Xferd Average Speed Time Time Time Current Step #26: Dload Upload Total Spent Left Speed Step #26: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33.4M 0 0 100 33.4M 0 72.2M --:--:-- --:--:-- --:--:-- 72.3M Finished Step #26 Starting Step #27 Step #27: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #27: % Total % Received % Xferd Average Speed Time Time Time Current Step #27: Dload Upload Total Spent Left Speed Step #27: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 238 0 0 100 238 0 754 --:--:-- --:--:-- --:--:-- 755 Finished Step #27 Starting Step #28 Step #28: Already have image (with digest): gcr.io/cloud-builders/curl Step #28: % Total % Received % Xferd Average Speed Time Time Time Current Step #28: Dload Upload Total Spent Left Speed Step #28: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 107 --:--:-- --:--:-- --:--:-- 107 Finished Step #28 Starting Step #29 Step #29: Already have image: gcr.io/oss-fuzz/jsoncons Finished Step #29 Starting Step #30 - "compile-libfuzzer-undefined-x86_64" Step #30 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #30 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #30 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #30 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #30 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #30 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function Step #30 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ Step #30 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #30 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-undefined-x86_64": + cd jsoncons/fuzzers Step #30 - "compile-libfuzzer-undefined-x86_64": + chmod +x ./build_fuzzers.sh Step #30 - "compile-libfuzzer-undefined-x86_64": + ./build_fuzzers.sh Step #30 - "compile-libfuzzer-undefined-x86_64": Compiling the fuzzers Step #30 - "compile-libfuzzer-undefined-x86_64": ./fuzzers/fuzz_msgpack_encoder.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #30 - "compile-libfuzzer-undefined-x86_64": 4 | #include  Step #30 - "compile-libfuzzer-undefined-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #30 - "compile-libfuzzer-undefined-x86_64": 1 error generated. Step #30 - "compile-libfuzzer-undefined-x86_64": ./fuzzers/fuzz_cbor_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #30 - "compile-libfuzzer-undefined-x86_64": 4 | #include  Step #30 - "compile-libfuzzer-undefined-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #30 - "compile-libfuzzer-undefined-x86_64": 1 error generated. Step #30 - "compile-libfuzzer-undefined-x86_64": ./fuzzers/fuzz_msgpack_parser_max.cpp:4:10: fatal error: 'catch/catch.hpp' file not found Step #30 - "compile-libfuzzer-undefined-x86_64": 4 | #include  Step #30 - "compile-libfuzzer-undefined-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #30 - "compile-libfuzzer-undefined-x86_64": 1 error generated. Finished Step #30 - "compile-libfuzzer-undefined-x86_64" Starting Step #31 - "build-check-libfuzzer-undefined-x86_64" Step #31 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_json_encoder Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_csv Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_json_parser_max Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_ubjson_parser_max Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_cbor_encoder Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_parse Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_ubjson Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_msgpack Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_bson Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_csv_encoder Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_ubjson_encoder Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_bson_encoder Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_cbor Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_bson_parser_max Step #31 - "build-check-libfuzzer-undefined-x86_64": Retrying failed fuzz targets sequentially 2 Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_parse Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor Step #31 - "build-check-libfuzzer-undefined-x86_64": Broken fuzz targets 2 Step #31 - "build-check-libfuzzer-undefined-x86_64": ('/tmp/not-out/tmp9bn8x7bu/fuzz_parse', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmp9bn8x7bu/fuzz_parse'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmp9bn8x7bu/fuzz_parse seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmp9bn8x7bu/fuzz_parse -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (6673 inline 8-bit counters): 6673 [0x55f2684f7be0, 0x55f2684f95f1), \nINFO: Loaded 1 PC tables (6673 PCs): 6673 [0x55f2684f95f8,0x55f268513708), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\ninclude/jsoncons/json_parser.hpp:145:29: runtime error: member access within address 0x7ffd0e261b20 which does not point to an object of type 'jsoncons::basic_json_parser'\n0x7ffd0e261b20: note: object has invalid vptr\n f2 55 00 00 20 14 4e 68 f2 55 00 00 a3 a4 40 68 f2 55 00 00 c4 1b 26 0e fd 7f 00 00 48 b7 48 20\n ^~~~~~~~~~~~~~~~~~~~~~~\n invalid vptr\n #0 0x55f26842601d in jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&) /src/jsoncons/./include/jsoncons/json_parser.hpp:145:29\n #1 0x55f26840fd7a in jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::allocator const&) /src/jsoncons/./include/jsoncons/json_parser.hpp:131:11\n #2 0x55f26840b675 in std::__1::enable_if, std::__1::allocator>, char>::value, jsoncons::basic_json>>::type jsoncons::basic_json>::parse, std::__1::allocator>>(std::__1::basic_string, std::__1::allocator> const&, jsoncons::basic_json_decode_options const&) /src/jsoncons/./include/jsoncons/basic_json.hpp:1873:42\n #3 0x55f26840b47a in LLVMFuzzerTestOneInput /src/jsoncons/./fuzzers/fuzz_parse.cpp:10:14\n #4 0x55f26836d940 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13\n #5 0x55f26836ee51 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:807:3\n #6 0x55f26836f3e2 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:867:3\n #7 0x55f26835e51b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:914:6\n #8 0x55f2683898f2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #9 0x7fa3202bd082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e)\n #10 0x55f268350d9d in _start (/tmp/not-out/tmp9bn8x7bu/fuzz_parse+0x66d9d)\n\nDEDUP_TOKEN: jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&)--jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::allocator const&)--std::__1::enable_if, std::__1::allocator>, char>::value, jsoncons::basic_json>>::type jsoncons::basic_json>::parse, std::__1::allocator>>(std::__1::basic_string, std::__1::allocator> const&, jsoncons::basic_json_decode_options const&)\nSUMMARY: UndefinedBehaviorSanitizer: undefined-behavior include/jsoncons/json_parser.hpp:145:29 \nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #31 - "build-check-libfuzzer-undefined-x86_64": BAD BUILD: /tmp/not-out/tmp9bn8x7bu/fuzz_parse seems to have either startup crash or exit: Step #31 - "build-check-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #31 - "build-check-libfuzzer-undefined-x86_64": /tmp/not-out/tmp9bn8x7bu/fuzz_parse -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Seed: 1337 Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Loaded 1 modules (6673 inline 8-bit counters): 6673 [0x560089a46be0, 0x560089a485f1), Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Loaded 1 PC tables (6673 PCs): 6673 [0x560089a485f8,0x560089a62708), Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #31 - "build-check-libfuzzer-undefined-x86_64": include/jsoncons/json_parser.hpp:145:29: runtime error: member access within address 0x7fffcd235be0 which does not point to an object of type 'jsoncons::basic_json_parser' Step #31 - "build-check-libfuzzer-undefined-x86_64": 0x7fffcd235be0: note: object has invalid vptr Step #31 - "build-check-libfuzzer-undefined-x86_64": 00 56 00 00 20 04 a3 89 00 56 00 00 a3 94 95 89 00 56 00 00 84 5c 23 cd ff 7f 00 00 48 87 6e bf Step #31 - "build-check-libfuzzer-undefined-x86_64": ^~~~~~~~~~~~~~~~~~~~~~~ Step #31 - "build-check-libfuzzer-undefined-x86_64": invalid vptr Step #31 - "build-check-libfuzzer-undefined-x86_64": #0 0x56008997501d in jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&) /src/jsoncons/./include/jsoncons/json_parser.hpp:145:29 Step #31 - "build-check-libfuzzer-undefined-x86_64": #1 0x56008995ed7a in jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::allocator const&) /src/jsoncons/./include/jsoncons/json_parser.hpp:131:11 Step #31 - "build-check-libfuzzer-undefined-x86_64": #2 0x56008995a675 in std::__1::enable_if, std::__1::allocator>, char>::value, jsoncons::basic_json>>::type jsoncons::basic_json>::parse, std::__1::allocator>>(std::__1::basic_string, std::__1::allocator> const&, jsoncons::basic_json_decode_options const&) /src/jsoncons/./include/jsoncons/basic_json.hpp:1873:42 Step #31 - "build-check-libfuzzer-undefined-x86_64": #3 0x56008995a47a in LLVMFuzzerTestOneInput /src/jsoncons/./fuzzers/fuzz_parse.cpp:10:14 Step #31 - "build-check-libfuzzer-undefined-x86_64": #4 0x5600898bc940 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #31 - "build-check-libfuzzer-undefined-x86_64": #5 0x5600898bde51 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:807:3 Step #31 - "build-check-libfuzzer-undefined-x86_64": #6 0x5600898be3e2 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:867:3 Step #31 - "build-check-libfuzzer-undefined-x86_64": #7 0x5600898ad51b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:914:6 Step #31 - "build-check-libfuzzer-undefined-x86_64": #8 0x5600898d88f2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-undefined-x86_64": #9 0x7fd3bf51a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #31 - "build-check-libfuzzer-undefined-x86_64": #10 0x56008989fd9d in _start (/tmp/not-out/tmp9bn8x7bu/fuzz_parse+0x66d9d) Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": DEDUP_TOKEN: jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&)--jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::allocator const&)--std::__1::enable_if, std::__1::allocator>, char>::value, jsoncons::basic_json>>::type jsoncons::basic_json>::parse, std::__1::allocator>>(std::__1::basic_string, std::__1::allocator> const&, jsoncons::basic_json_decode_options const&) Step #31 - "build-check-libfuzzer-undefined-x86_64": SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior include/jsoncons/json_parser.hpp:145:29 Step #31 - "build-check-libfuzzer-undefined-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #31 - "build-check-libfuzzer-undefined-x86_64": Base64: Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": ('/tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (5747 inline 8-bit counters): 5747 [0x5652484fa850, 0x5652484fbec3), \nINFO: Loaded 1 PC tables (5747 PCs): 5747 [0x5652484fbec8,0x5652485125f8), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\ninclude/jsoncons/json_parser.hpp:145:29: runtime error: member access within address 0x7fff7aad6f30 which does not point to an object of type 'jsoncons::basic_json_parser'\n0x7fff7aad6f30: note: object has invalid vptr\n 00 00 00 00 1e f0 6a 01 00 00 00 00 84 6f ad 7a ff 7f 00 00 00 00 00 00 a5 7f 00 00 50 70 ad 7a\n ^~~~~~~~~~~~~~~~~~~~~~~\n invalid vptr\n #0 0x5652483fbc7d in jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&) /src/jsoncons/./include/jsoncons/json_parser.hpp:145:29\n #1 0x5652483fb189 in jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::allocator_arg_t, std::__1::allocator const&, std::__1::basic_istringstream, std::__1::allocator>&, jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::error_code&, std::__1::enable_if>, std::__1::basic_istringstream, std::__1::allocator>&>::value, void>::type*) /src/jsoncons/./include/jsoncons/json_cursor.hpp:130:10\n #2 0x5652483bc7e8 in jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::basic_istringstream, std::__1::allocator>&, std::__1::error_code&) /src/jsoncons/./include/jsoncons/json_cursor.hpp:89:11\n #3 0x5652483bbf7f in LLVMFuzzerTestOneInput /src/jsoncons/./fuzzers/fuzz_json_cursor.cpp:12:28\n #4 0x56524831e500 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13\n #5 0x56524831fa11 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:807:3\n #6 0x56524831ffa2 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:867:3\n #7 0x56524830f0db in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:914:6\n #8 0x56524833a4b2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #9 0x7fa5b8e7f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e)\n #10 0x56524830195d in _start (/tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor+0x6c95d)\n\nDEDUP_TOKEN: jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&)--jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::allocator_arg_t, std::__1::allocator const&, std::__1::basic_istringstream, std::__1::allocator>&, jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::error_code&, std::__1::enable_if>, std::__1::basic_istringstream, std::__1::allocator>&>::value, void>::type*)--jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::basic_istringstream, std::__1::allocator>&, std::__1::error_code&)\nSUMMARY: UndefinedBehaviorSanitizer: undefined-behavior include/jsoncons/json_parser.hpp:145:29 \nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #31 - "build-check-libfuzzer-undefined-x86_64": BAD BUILD: /tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor seems to have either startup crash or exit: Step #31 - "build-check-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #31 - "build-check-libfuzzer-undefined-x86_64": /tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Seed: 1337 Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Loaded 1 modules (5747 inline 8-bit counters): 5747 [0x5594011b4850, 0x5594011b5ec3), Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: Loaded 1 PC tables (5747 PCs): 5747 [0x5594011b5ec8,0x5594011cc5f8), Step #31 - "build-check-libfuzzer-undefined-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #31 - "build-check-libfuzzer-undefined-x86_64": include/jsoncons/json_parser.hpp:145:29: runtime error: member access within address 0x7ffdec2002b0 which does not point to an object of type 'jsoncons::basic_json_parser' Step #31 - "build-check-libfuzzer-undefined-x86_64": 0x7ffdec2002b0: note: object has invalid vptr Step #31 - "build-check-libfuzzer-undefined-x86_64": 00 00 00 00 1e f0 6a 01 00 00 00 00 04 03 20 ec fd 7f 00 00 00 00 00 00 8f 7f 00 00 d0 03 20 ec Step #31 - "build-check-libfuzzer-undefined-x86_64": ^~~~~~~~~~~~~~~~~~~~~~~ Step #31 - "build-check-libfuzzer-undefined-x86_64": invalid vptr Step #31 - "build-check-libfuzzer-undefined-x86_64": #0 0x5594010b5c7d in jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&) /src/jsoncons/./include/jsoncons/json_parser.hpp:145:29 Step #31 - "build-check-libfuzzer-undefined-x86_64": #1 0x5594010b5189 in jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::allocator_arg_t, std::__1::allocator const&, std::__1::basic_istringstream, std::__1::allocator>&, jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::error_code&, std::__1::enable_if>, std::__1::basic_istringstream, std::__1::allocator>&>::value, void>::type*) /src/jsoncons/./include/jsoncons/json_cursor.hpp:130:10 Step #31 - "build-check-libfuzzer-undefined-x86_64": #2 0x5594010767e8 in jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::basic_istringstream, std::__1::allocator>&, std::__1::error_code&) /src/jsoncons/./include/jsoncons/json_cursor.hpp:89:11 Step #31 - "build-check-libfuzzer-undefined-x86_64": #3 0x559401075f7f in LLVMFuzzerTestOneInput /src/jsoncons/./fuzzers/fuzz_json_cursor.cpp:12:28 Step #31 - "build-check-libfuzzer-undefined-x86_64": #4 0x559400fd8500 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #31 - "build-check-libfuzzer-undefined-x86_64": #5 0x559400fd9a11 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:807:3 Step #31 - "build-check-libfuzzer-undefined-x86_64": #6 0x559400fd9fa2 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:867:3 Step #31 - "build-check-libfuzzer-undefined-x86_64": #7 0x559400fc90db in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:914:6 Step #31 - "build-check-libfuzzer-undefined-x86_64": #8 0x559400ff44b2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-undefined-x86_64": #9 0x7f8ff93e5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #31 - "build-check-libfuzzer-undefined-x86_64": #10 0x559400fbb95d in _start (/tmp/not-out/tmp9bn8x7bu/fuzz_json_cursor+0x6c95d) Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": DEDUP_TOKEN: jsoncons::basic_json_parser>::basic_json_parser(jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::allocator const&)--jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::allocator_arg_t, std::__1::allocator const&, std::__1::basic_istringstream, std::__1::allocator>&, jsoncons::basic_json_decode_options const&, std::__1::function, std::__1::error_code&, std::__1::enable_if>, std::__1::basic_istringstream, std::__1::allocator>&>::value, void>::type*)--jsoncons::basic_json_cursor, std::__1::allocator>::basic_json_cursor, std::__1::allocator>&>(std::__1::basic_istringstream, std::__1::allocator>&, std::__1::error_code&) Step #31 - "build-check-libfuzzer-undefined-x86_64": SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior include/jsoncons/json_parser.hpp:145:29 Step #31 - "build-check-libfuzzer-undefined-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #31 - "build-check-libfuzzer-undefined-x86_64": Base64: Step #31 - "build-check-libfuzzer-undefined-x86_64": Step #31 - "build-check-libfuzzer-undefined-x86_64": ERROR: 13.333333333333334% of fuzz targets seem to be broken. See the list above for a detailed information. Step #31 - "build-check-libfuzzer-undefined-x86_64": ******************************************************************************** Step #31 - "build-check-libfuzzer-undefined-x86_64": Build checks failed. Step #31 - "build-check-libfuzzer-undefined-x86_64": To reproduce, run: Step #31 - "build-check-libfuzzer-undefined-x86_64": python infra/helper.py build_image jsoncons Step #31 - "build-check-libfuzzer-undefined-x86_64": python infra/helper.py build_fuzzers --sanitizer undefined --engine libfuzzer --architecture x86_64 jsoncons Step #31 - "build-check-libfuzzer-undefined-x86_64": python infra/helper.py check_build --sanitizer undefined --engine libfuzzer --architecture x86_64 jsoncons Step #31 - "build-check-libfuzzer-undefined-x86_64": ******************************************************************************** Finished Step #31 - "build-check-libfuzzer-undefined-x86_64" ERROR ERROR: build step 31 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1