starting build "b2a2f8cc-898f-496c-8500-494d677a9259" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1" Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Sending build context to Docker daemon 5.12kB Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": latest: Pulling from oss-fuzz-base/base-builder Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b549f31133a9: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ef3c76f7df30: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 9f8f643d8006: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b64057a12e1c: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 662006bb0807: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 4b503ca9d9bc: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f1a29e744437: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a2a22f967804: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": e72648080e63: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 945b5a62f111: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a33fbe52522f: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": cb8adac1e4ac: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6ce5e7ad829b: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 78b3cc2fa6e6: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 197024c931b9: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 940045afa063: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 1a3163cb01c1: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 7ea3debb8cbd: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2b97e04a97b5: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f8a36e1c021e: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 3c9abd7d8840: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f92ce4f9f90d: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a8835054d016: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b685c4d35c3a: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dac9741d43d2: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dc9f433701a6: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 44fc7f7b3c67: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 67a3febf6e4c: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 981575c1df4c: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 98a640299daa: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2820a6581e2a: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 82f096e556a3: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6b6d59cb5bb8: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b172b1ba4696: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6a11c270d7cc: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": d9b527ce6e49: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2869f64c54c1: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 8d2570283fa5: Pulling fs layer Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 945b5a62f111: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f1a29e744437: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a33fbe52522f: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": cb8adac1e4ac: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6ce5e7ad829b: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a8835054d016: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 78b3cc2fa6e6: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 197024c931b9: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 940045afa063: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dc9f433701a6: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f8a36e1c021e: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 1a3163cb01c1: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 3c9abd7d8840: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 98a640299daa: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f92ce4f9f90d: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6a11c270d7cc: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2869f64c54c1: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a2a22f967804: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6b6d59cb5bb8: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 67a3febf6e4c: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 981575c1df4c: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2b97e04a97b5: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dac9741d43d2: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b685c4d35c3a: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b172b1ba4696: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 8d2570283fa5: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": e72648080e63: Waiting Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 662006bb0807: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 662006bb0807: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 9f8f643d8006: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f1a29e744437: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f1a29e744437: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a2a22f967804: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b549f31133a9: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b549f31133a9: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b64057a12e1c: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b64057a12e1c: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": cb8adac1e4ac: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": cb8adac1e4ac: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a33fbe52522f: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a33fbe52522f: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6ce5e7ad829b: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6ce5e7ad829b: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ef3c76f7df30: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ef3c76f7df30: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 78b3cc2fa6e6: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 945b5a62f111: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 945b5a62f111: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 197024c931b9: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 940045afa063: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 940045afa063: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2b97e04a97b5: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2b97e04a97b5: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f8a36e1c021e: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f8a36e1c021e: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 7ea3debb8cbd: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 7ea3debb8cbd: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 1a3163cb01c1: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 1a3163cb01c1: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 3c9abd7d8840: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 3c9abd7d8840: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f92ce4f9f90d: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f92ce4f9f90d: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b685c4d35c3a: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a8835054d016: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a8835054d016: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dac9741d43d2: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dac9741d43d2: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b549f31133a9: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dc9f433701a6: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 44fc7f7b3c67: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 44fc7f7b3c67: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 981575c1df4c: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 981575c1df4c: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": e72648080e63: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 67a3febf6e4c: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 67a3febf6e4c: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2820a6581e2a: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 82f096e556a3: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 82f096e556a3: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6b6d59cb5bb8: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6b6d59cb5bb8: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 98a640299daa: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 98a640299daa: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b172b1ba4696: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b172b1ba4696: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6a11c270d7cc: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6a11c270d7cc: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": d9b527ce6e49: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2869f64c54c1: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2869f64c54c1: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 8d2570283fa5: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 8d2570283fa5: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 4b503ca9d9bc: Verifying Checksum Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 4b503ca9d9bc: Download complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ef3c76f7df30: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 9f8f643d8006: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b64057a12e1c: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 662006bb0807: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 4b503ca9d9bc: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f1a29e744437: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a2a22f967804: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": e72648080e63: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 945b5a62f111: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a33fbe52522f: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": cb8adac1e4ac: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6ce5e7ad829b: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 78b3cc2fa6e6: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 197024c931b9: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 940045afa063: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 1a3163cb01c1: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 7ea3debb8cbd: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2b97e04a97b5: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f8a36e1c021e: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 3c9abd7d8840: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": f92ce4f9f90d: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": a8835054d016: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b685c4d35c3a: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dac9741d43d2: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": dc9f433701a6: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 44fc7f7b3c67: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 67a3febf6e4c: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 981575c1df4c: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 98a640299daa: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2820a6581e2a: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 82f096e556a3: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6b6d59cb5bb8: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": b172b1ba4696: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 6a11c270d7cc: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": d9b527ce6e49: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 2869f64c54c1: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 8d2570283fa5: Pull complete Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Digest: sha256:a4271b062282b1b60e392f6054a42ac413023120d26b14c4dc46e9afebb6e6bc Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> cdba03bb9c46 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Step 2/5 : RUN apt-get update && apt-get install -y ninja-build wget Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> Running in 38cb9864d563 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Get:3 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Fetched 383 kB in 1s (549 kB/s) Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Reading package lists... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Reading package lists... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Building dependency tree... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Reading state information... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": wget is already the newest version (1.20.3-1ubuntu2.1). Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": The following packages were automatically installed and are no longer required: Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": autotools-dev libsigsegv2 m4 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Use 'apt autoremove' to remove them. Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Suggested packages: Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": python3 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": The following NEW packages will be installed: Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ninja-build Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Need to get 107 kB of archives. Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": After this operation, 338 kB of additional disk space will be used. Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 ninja-build amd64 1.10.0-1build1 [107 kB] Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Fetched 107 kB in 0s (627 kB/s) Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Selecting previously unselected package ninja-build. Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17483 files and directories currently installed.) Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Preparing to unpack .../ninja-build_1.10.0-1build1_amd64.deb ... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Unpacking ninja-build (1.10.0-1build1) ... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Setting up ninja-build (1.10.0-1build1) ... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Removing intermediate container 38cb9864d563 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> 56785d58e13a Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Step 3/5 : RUN git clone --depth 1 https://github.com/simdjson/simdjson.git simdjson Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> Running in 4ab9c35f2019 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Cloning into 'simdjson'... Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Removing intermediate container 4ab9c35f2019 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> 98db2c63fa66 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Step 4/5 : WORKDIR simdjson Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> Running in 3f71c0b69420 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Removing intermediate container 3f71c0b69420 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> 242a9121a831 Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Step 5/5 : COPY build.sh $SRC/ Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": ---> 292c185d8e2a Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Successfully built 292c185d8e2a Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Successfully tagged gcr.io/oss-fuzz/simdjson:latest Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/simdjson:latest Finished Step #1 - "build-ed76f74a-54e0-4674-a4a6-295c102086e1" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/simdjson Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filegmXF0L Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/simdjson/.git Step #2 - "srcmap": + GIT_DIR=/src/simdjson Step #2 - "srcmap": + cd /src/simdjson Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/simdjson/simdjson.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=b1c31b428d03f3c10df9142fe709b876bef455c2 Step #2 - "srcmap": + jq_inplace /tmp/filegmXF0L '."/src/simdjson" = { type: "git", url: "https://github.com/simdjson/simdjson.git", rev: "b1c31b428d03f3c10df9142fe709b876bef455c2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filePjEJh9 Step #2 - "srcmap": + cat /tmp/filegmXF0L Step #2 - "srcmap": + jq '."/src/simdjson" = { type: "git", url: "https://github.com/simdjson/simdjson.git", rev: "b1c31b428d03f3c10df9142fe709b876bef455c2" }' Step #2 - "srcmap": + mv /tmp/filePjEJh9 /tmp/filegmXF0L Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filegmXF0L Step #2 - "srcmap": + rm /tmp/filegmXF0L Step #2 - "srcmap": { Step #2 - "srcmap": "/src/simdjson": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/simdjson/simdjson.git", Step #2 - "srcmap": "rev": "b1c31b428d03f3c10df9142fe709b876bef455c2" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-afl-address-x86_64" Step #3 - "compile-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-afl-address-x86_64": Copying precompiled AFL++ Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": AFL++ target compilation setup: Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #3 - "compile-afl-address-x86_64": AFL_QUIET=1 Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": done. Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": CC=/src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": CXX=/src/aflplusplus/afl-clang-fast++ Step #3 - "compile-afl-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope Step #3 - "compile-afl-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ Step #3 - "compile-afl-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": + fuzz/ossfuzz.sh Step #3 - "compile-afl-address-x86_64": + which zip Step #3 - "compile-afl-address-x86_64": + which cmake Step #3 - "compile-afl-address-x86_64": + which ninja Step #3 - "compile-afl-address-x86_64": + fuzz/build_corpus.sh Step #3 - "compile-afl-address-x86_64": + mkdir -p build Step #3 - "compile-afl-address-x86_64": + cd build Step #3 - "compile-afl-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=/usr/lib/libFuzzingEngine.a Step #3 - "compile-afl-address-x86_64": -- The CXX compiler identification is Clang 22.0.0 Step #3 - "compile-afl-address-x86_64": -- The C compiler identification is Clang 22.0.0 Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-afl-address-x86_64": -- Check for working CXX compiler: /src/aflplusplus/afl-clang-fast++ - skipped Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compile features Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-afl-address-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-afl-address-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-afl-address-x86_64": -- Check for working C compiler: /src/aflplusplus/afl-clang-fast - skipped Step #3 - "compile-afl-address-x86_64": -- Detecting C compile features Step #3 - "compile-afl-address-x86_64": -- Detecting C compile features - done Step #3 - "compile-afl-address-x86_64": -- Looking for fork Step #3 - "compile-afl-address-x86_64": -- Looking for fork - found Step #3 - "compile-afl-address-x86_64": -- Looking for wait Step #3 - "compile-afl-address-x86_64": -- Looking for wait - found Step #3 - "compile-afl-address-x86_64": -- Adding -Og to compile flag Step #3 - "compile-afl-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #3 - "compile-afl-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #3 - "compile-afl-address-x86_64": -- Found Threads: TRUE Step #3 - "compile-afl-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #3 - "compile-afl-address-x86_64": -- CPM: Adding package cxxopts@ () Step #3 - "compile-afl-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #3 - "compile-afl-address-x86_64": -- Found Python3: /usr/local/bin/python3.11 (found version "3.11.13") found components: Interpreter Step #3 - "compile-afl-address-x86_64": -- Including amalgamate_demo test. Step #3 - "compile-afl-address-x86_64": -- Including simdjson-singleheader test. Step #3 - "compile-afl-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #3 - "compile-afl-address-x86_64": -- compiler id: Clang version: 22.0.0 Step #3 - "compile-afl-address-x86_64": -- We disable the checkperf targets under Ninja. Step #3 - "compile-afl-address-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 Step #3 - "compile-afl-address-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 - Success Step #3 - "compile-afl-address-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE Step #3 - "compile-afl-address-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE - Success Step #3 - "compile-afl-address-x86_64": -- Configuring done (4.6s) Step #3 - "compile-afl-address-x86_64": -- Generating done (0.1s) Step #3 - "compile-afl-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #3 - "compile-afl-address-x86_64": + cmake --build . --target all_fuzzers Step #3 - "compile-afl-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_ondemand [19/28] Linking CXX executable fuzz/fuzz_parser [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [23/28] Linking CXX executable fuzz/fuzz_implementations [24/28] Linking CXX executable fuzz/fuzz_print_json [25/28] Linking CXX executable fuzz/fuzz_minifyimpl [26/28] Linking CXX executable fuzz/fuzz_dump [27/28] Linking CXX executable fuzz/fuzz_utf8 [28/28] Linking CXX executable fuzz/fuzz_element Step #3 - "compile-afl-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/afl-address-x86_64 Step #3 - "compile-afl-address-x86_64": + grep -v .zip$ Step #3 - "compile-afl-address-x86_64": + ls /workspace/out/afl-address-x86_64/fuzz_atpointer /workspace/out/afl-address-x86_64/fuzz_dump /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape /workspace/out/afl-address-x86_64/fuzz_element /workspace/out/afl-address-x86_64/fuzz_implementations /workspace/out/afl-address-x86_64/fuzz_minify /workspace/out/afl-address-x86_64/fuzz_minifyimpl /workspace/out/afl-address-x86_64/fuzz_ndjson /workspace/out/afl-address-x86_64/fuzz_ondemand /workspace/out/afl-address-x86_64/fuzz_padded /workspace/out/afl-address-x86_64/fuzz_parser /workspace/out/afl-address-x86_64/fuzz_print_json /workspace/out/afl-address-x86_64/fuzz_utf8 Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_atpointer Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_atpointer.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_dump Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_dump.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_element Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_element.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_implementations Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_implementations.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_minify Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_minify.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_minifyimpl Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_minifyimpl.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_ndjson Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_ndjson.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_ondemand Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_ondemand.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_padded Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_padded.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_parser Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_parser.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_print_json Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_print_json.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_utf8 Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_utf8.zip Finished Step #3 - "compile-afl-address-x86_64" Starting Step #4 - "build-check-afl-address-x86_64" Step #4 - "build-check-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-afl-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-afl-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-afl-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-afl-address-x86_64": ef3c76f7df30: Already exists Step #4 - "build-check-afl-address-x86_64": 9f8f643d8006: Already exists Step #4 - "build-check-afl-address-x86_64": 0f48af65b814: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 633a0e05339d: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 3177fed33998: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 2e478429a198: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 4f862654912a: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 4d5ecc5a85a3: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 861dbe526d45: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": f0d22c3bd001: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": c7365ba546a7: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 81305a35774f: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 084b00e4fd2a: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 2571f26ef59d: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": f3ad3c26378e: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 23630c9e3597: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 686f4cb8643a: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": e9cb1af2d3fd: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 485022339309: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": bacda3c2d798: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": c57fafada48f: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 68403e1b2d67: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 6456ed930b42: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": c1d227e471d8: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": c4fc3ca540a9: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": d64a40b43ad5: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": f3ad3c26378e: Waiting Step #4 - "build-check-afl-address-x86_64": 23630c9e3597: Waiting Step #4 - "build-check-afl-address-x86_64": 686f4cb8643a: Waiting Step #4 - "build-check-afl-address-x86_64": e9cb1af2d3fd: Waiting Step #4 - "build-check-afl-address-x86_64": 485022339309: Waiting Step #4 - "build-check-afl-address-x86_64": bacda3c2d798: Waiting Step #4 - "build-check-afl-address-x86_64": c57fafada48f: Waiting Step #4 - "build-check-afl-address-x86_64": 68403e1b2d67: Waiting Step #4 - "build-check-afl-address-x86_64": 6456ed930b42: Waiting Step #4 - "build-check-afl-address-x86_64": c1d227e471d8: Waiting Step #4 - "build-check-afl-address-x86_64": f0d22c3bd001: Waiting Step #4 - "build-check-afl-address-x86_64": c4fc3ca540a9: Waiting Step #4 - "build-check-afl-address-x86_64": c7365ba546a7: Waiting Step #4 - "build-check-afl-address-x86_64": d64a40b43ad5: Waiting Step #4 - "build-check-afl-address-x86_64": 81305a35774f: Waiting Step #4 - "build-check-afl-address-x86_64": 861dbe526d45: Waiting Step #4 - "build-check-afl-address-x86_64": 084b00e4fd2a: Waiting Step #4 - "build-check-afl-address-x86_64": 2571f26ef59d: Waiting Step #4 - "build-check-afl-address-x86_64": 3177fed33998: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 3177fed33998: Download complete Step #4 - "build-check-afl-address-x86_64": 4f862654912a: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 4f862654912a: Download complete Step #4 - "build-check-afl-address-x86_64": 0f48af65b814: Download complete Step #4 - "build-check-afl-address-x86_64": 633a0e05339d: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 633a0e05339d: Download complete Step #4 - "build-check-afl-address-x86_64": 861dbe526d45: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 861dbe526d45: Download complete Step #4 - "build-check-afl-address-x86_64": 2e478429a198: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 2e478429a198: Download complete Step #4 - "build-check-afl-address-x86_64": f0d22c3bd001: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": f0d22c3bd001: Download complete Step #4 - "build-check-afl-address-x86_64": c7365ba546a7: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": c7365ba546a7: Download complete Step #4 - "build-check-afl-address-x86_64": 0f48af65b814: Pull complete Step #4 - "build-check-afl-address-x86_64": 2571f26ef59d: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 2571f26ef59d: Download complete Step #4 - "build-check-afl-address-x86_64": f3ad3c26378e: Download complete Step #4 - "build-check-afl-address-x86_64": 084b00e4fd2a: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 084b00e4fd2a: Download complete Step #4 - "build-check-afl-address-x86_64": 686f4cb8643a: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 686f4cb8643a: Download complete Step #4 - "build-check-afl-address-x86_64": 485022339309: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 485022339309: Download complete Step #4 - "build-check-afl-address-x86_64": 633a0e05339d: Pull complete Step #4 - "build-check-afl-address-x86_64": bacda3c2d798: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": bacda3c2d798: Download complete Step #4 - "build-check-afl-address-x86_64": 4d5ecc5a85a3: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 4d5ecc5a85a3: Download complete Step #4 - "build-check-afl-address-x86_64": 3177fed33998: Pull complete Step #4 - "build-check-afl-address-x86_64": 6456ed930b42: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 6456ed930b42: Download complete Step #4 - "build-check-afl-address-x86_64": 68403e1b2d67: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 68403e1b2d67: Download complete Step #4 - "build-check-afl-address-x86_64": 2e478429a198: Pull complete Step #4 - "build-check-afl-address-x86_64": 81305a35774f: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 81305a35774f: Download complete Step #4 - "build-check-afl-address-x86_64": c4fc3ca540a9: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": c4fc3ca540a9: Download complete Step #4 - "build-check-afl-address-x86_64": d64a40b43ad5: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": d64a40b43ad5: Download complete Step #4 - "build-check-afl-address-x86_64": 4f862654912a: Pull complete Step #4 - "build-check-afl-address-x86_64": c1d227e471d8: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": c1d227e471d8: Download complete Step #4 - "build-check-afl-address-x86_64": c57fafada48f: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": c57fafada48f: Download complete Step #4 - "build-check-afl-address-x86_64": 23630c9e3597: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 23630c9e3597: Download complete Step #4 - "build-check-afl-address-x86_64": e9cb1af2d3fd: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": e9cb1af2d3fd: Download complete Step #4 - "build-check-afl-address-x86_64": 4d5ecc5a85a3: Pull complete Step #4 - "build-check-afl-address-x86_64": 861dbe526d45: Pull complete Step #4 - "build-check-afl-address-x86_64": f0d22c3bd001: Pull complete Step #4 - "build-check-afl-address-x86_64": c7365ba546a7: Pull complete Step #4 - "build-check-afl-address-x86_64": 81305a35774f: Pull complete Step #4 - "build-check-afl-address-x86_64": 084b00e4fd2a: Pull complete Step #4 - "build-check-afl-address-x86_64": 2571f26ef59d: Pull complete Step #4 - "build-check-afl-address-x86_64": f3ad3c26378e: Pull complete Step #4 - "build-check-afl-address-x86_64": 23630c9e3597: Pull complete Step #4 - "build-check-afl-address-x86_64": 686f4cb8643a: Pull complete Step #4 - "build-check-afl-address-x86_64": e9cb1af2d3fd: Pull complete Step #4 - "build-check-afl-address-x86_64": 485022339309: Pull complete Step #4 - "build-check-afl-address-x86_64": bacda3c2d798: Pull complete Step #4 - "build-check-afl-address-x86_64": c57fafada48f: Pull complete Step #4 - "build-check-afl-address-x86_64": 68403e1b2d67: Pull complete Step #4 - "build-check-afl-address-x86_64": 6456ed930b42: Pull complete Step #4 - "build-check-afl-address-x86_64": c1d227e471d8: Pull complete Step #4 - "build-check-afl-address-x86_64": c4fc3ca540a9: Pull complete Step #4 - "build-check-afl-address-x86_64": d64a40b43ad5: Pull complete Step #4 - "build-check-afl-address-x86_64": Digest: sha256:fca20b650077b304d8fda564b4e8e271b7605c6c867f322be5273900ded9d1b8 Step #4 - "build-check-afl-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_padded Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_minifyimpl Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_element Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_parser Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_atpointer Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_print_json Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_dump Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_utf8 Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_implementations Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_minify Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_ondemand Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_dump_raw_tape Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp1uitzfa5/fuzz_ndjson Finished Step #4 - "build-check-afl-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/simdjson Step #6: adding: SanitizerCoverageLTO.so (deflated 69%) Step #6: adding: SanitizerCoveragePCGUARD.so (deflated 70%) Step #6: adding: afl-addseeds (deflated 57%) Step #6: adding: afl-analyze (deflated 55%) Step #6: adding: afl-c++ (deflated 57%) Step #6: adding: afl-c++.8 (deflated 55%) Step #6: adding: afl-cc (deflated 57%) Step #6: adding: afl-cc.8 (deflated 55%) Step #6: adding: afl-clang (deflated 57%) Step #6: adding: afl-clang++ (deflated 57%) Step #6: adding: afl-clang-fast (deflated 57%) Step #6: adding: afl-clang-fast++ (deflated 57%) Step #6: adding: afl-clang-fast++.8 (deflated 55%) Step #6: adding: afl-clang-fast.8 (deflated 55%) Step #6: adding: afl-clang-lto (deflated 57%) Step #6: adding: afl-clang-lto++ (deflated 57%) Step #6: adding: afl-clang-lto++.8 (deflated 55%) Step #6: adding: afl-clang-lto.8 (deflated 55%) Step #6: adding: afl-cmin (deflated 70%) Step #6: adding: afl-cmin.bash (deflated 65%) Step #6: adding: afl-cmin.py (deflated 71%) Step #6: adding: afl-compiler-rt-32.o (deflated 54%) Step #6: adding: afl-compiler-rt-64.o (deflated 67%) Step #6: adding: afl-compiler-rt.o (deflated 67%) Step #6: adding: afl-fuzz (deflated 55%) Step #6: adding: afl-g++ (deflated 57%) Step #6: adding: afl-gcc (deflated 57%) Step #6: adding: afl-gotcpu (deflated 62%) Step #6: adding: afl-ld-lto (deflated 62%) Step #6: adding: afl-llvm-dict2file.so (deflated 69%) Step #6: adding: afl-llvm-lto-instrumentlist.so (deflated 71%) Step #6: adding: afl-llvm-pass.so (deflated 69%) Step #6: adding: afl-llvm-rt-lto-32.o (deflated 20%) Step #6: adding: afl-llvm-rt-lto-64.o (deflated 20%) Step #6: adding: afl-llvm-rt-lto.o (deflated 20%) Step #6: adding: afl-lto (deflated 57%) Step #6: adding: afl-lto++ (deflated 57%) Step #6: adding: afl-lto++.8 (deflated 55%) Step #6: adding: afl-lto.8 (deflated 55%) Step #6: adding: afl-persistent-config (deflated 59%) Step #6: adding: afl-plot (deflated 65%) Step #6: adding: afl-showmap (deflated 55%) Step #6: adding: afl-system-config (deflated 63%) Step #6: adding: afl-tmin (deflated 55%) Step #6: adding: afl-whatsup (deflated 69%) Step #6: adding: afl-wine-trace (deflated 70%) Step #6: adding: afl_options.txt (deflated 20%) Step #6: adding: cmplog-instructions-pass.so (deflated 71%) Step #6: adding: cmplog-routines-pass.so (deflated 70%) Step #6: adding: cmplog-switches-pass.so (deflated 70%) Step #6: adding: compare-transform-pass.so (deflated 69%) Step #6: adding: dynamic_list.txt (deflated 76%) Step #6: adding: fuzz_atpointer (deflated 66%) Step #6: adding: fuzz_atpointer.zip (stored 0%) Step #6: adding: fuzz_dump (deflated 66%) Step #6: adding: fuzz_dump.zip (stored 0%) Step #6: adding: fuzz_dump_raw_tape (deflated 66%) Step #6: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #6: adding: fuzz_element (deflated 66%) Step #6: adding: fuzz_element.zip (stored 0%) Step #6: adding: fuzz_implementations (deflated 66%) Step #6: adding: fuzz_implementations.zip (stored 0%) Step #6: adding: fuzz_minify (deflated 66%) Step #6: adding: fuzz_minify.zip (stored 0%) Step #6: adding: fuzz_minifyimpl (deflated 66%) Step #6: adding: fuzz_minifyimpl.zip (stored 0%) Step #6: adding: fuzz_ndjson (deflated 66%) Step #6: adding: fuzz_ndjson.zip (stored 0%) Step #6: adding: fuzz_ondemand (deflated 66%) Step #6: adding: fuzz_ondemand.zip (stored 0%) Step #6: adding: fuzz_padded (deflated 67%) Step #6: adding: fuzz_padded.zip (stored 0%) Step #6: adding: fuzz_parser (deflated 66%) Step #6: adding: fuzz_parser.zip (stored 0%) Step #6: adding: fuzz_print_json (deflated 66%) Step #6: adding: fuzz_print_json.zip (stored 0%) Step #6: adding: fuzz_utf8 (deflated 66%) Step #6: adding: fuzz_utf8.zip (stored 0%) Step #6: adding: injection-pass.so (deflated 70%) Step #6: adding: libAFLDriver.a (deflated 64%) Step #6: adding: libAFLQemuDriver.a (deflated 65%) Step #6: adding: llvm-symbolizer (deflated 65%) Step #6: adding: split-compares-pass.so (deflated 69%) Step #6: adding: split-switches-pass.so (deflated 70%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 89257482f398: Waiting Step #7: 5c9125a401ae: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Download complete Step #7: d4fceeeb758e: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 806 --:--:-- --:--:-- --:--:-- 805 100 157 0 0 100 157 0 806 --:--:-- --:--:-- --:--:-- 805 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32.6M 0 0 100 32.6M 0 90.2M --:--:-- --:--:-- --:--:-- 90.3M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 666 --:--:-- --:--:-- --:--:-- 666 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 160 --:--:-- --:--:-- --:--:-- 160 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #11 Starting Step #12 - "compile-honggfuzz-address-x86_64" Step #12 - "compile-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": vm.mmap_rnd_bits = 28 Step #12 - "compile-honggfuzz-address-x86_64": Skipping compilation; using precompiled honggfuzz Step #12 - "compile-honggfuzz-address-x86_64": done. Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": CC=clang Step #12 - "compile-honggfuzz-address-x86_64": CXX=clang++ Step #12 - "compile-honggfuzz-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp Step #12 - "compile-honggfuzz-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ Step #12 - "compile-honggfuzz-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": + fuzz/ossfuzz.sh Step #12 - "compile-honggfuzz-address-x86_64": + which zip Step #12 - "compile-honggfuzz-address-x86_64": + which cmake Step #12 - "compile-honggfuzz-address-x86_64": + which ninja Step #12 - "compile-honggfuzz-address-x86_64": + fuzz/build_corpus.sh Step #12 - "compile-honggfuzz-address-x86_64": + mkdir -p build Step #12 - "compile-honggfuzz-address-x86_64": + cd build Step #12 - "compile-honggfuzz-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=/usr/lib/libFuzzingEngine.a Step #12 - "compile-honggfuzz-address-x86_64": -- The CXX compiler identification is Clang 22.0.0 Step #12 - "compile-honggfuzz-address-x86_64": -- The C compiler identification is Clang 22.0.0 Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compiler ABI info Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compiler ABI info - done Step #12 - "compile-honggfuzz-address-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compile features Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compile features - done Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compiler ABI info Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compiler ABI info - done Step #12 - "compile-honggfuzz-address-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compile features Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compile features - done Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for fork Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for fork - found Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for wait Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for wait - found Step #12 - "compile-honggfuzz-address-x86_64": -- Adding -Og to compile flag Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #12 - "compile-honggfuzz-address-x86_64": -- Found Threads: TRUE Step #12 - "compile-honggfuzz-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #12 - "compile-honggfuzz-address-x86_64": -- CPM: Adding package cxxopts@ () Step #12 - "compile-honggfuzz-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #12 - "compile-honggfuzz-address-x86_64": -- Found Python3: /usr/local/bin/python3.11 (found version "3.11.13") found components: Interpreter Step #12 - "compile-honggfuzz-address-x86_64": -- Including amalgamate_demo test. Step #12 - "compile-honggfuzz-address-x86_64": -- Including simdjson-singleheader test. Step #12 - "compile-honggfuzz-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #12 - "compile-honggfuzz-address-x86_64": -- compiler id: Clang version: 22.0.0 Step #12 - "compile-honggfuzz-address-x86_64": -- We disable the checkperf targets under Ninja. Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 - Success Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE - Success Step #12 - "compile-honggfuzz-address-x86_64": -- Configuring done (4.4s) Step #12 - "compile-honggfuzz-address-x86_64": -- Generating done (0.1s) Step #12 - "compile-honggfuzz-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #12 - "compile-honggfuzz-address-x86_64": + cmake --build . --target all_fuzzers Step #12 - "compile-honggfuzz-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_parser [18/28] Linking CXX executable fuzz/fuzz_ondemand [19/28] Linking CXX executable fuzz/fuzz_minify [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_dump [23/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [24/28] Linking CXX executable fuzz/fuzz_utf8 [25/28] Linking CXX executable fuzz/fuzz_print_json [26/28] Linking CXX executable fuzz/fuzz_implementations [27/28] Linking CXX executable fuzz/fuzz_element [28/28] Linking CXX executable fuzz/fuzz_minifyimpl Step #12 - "compile-honggfuzz-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/honggfuzz-address-x86_64 Step #12 - "compile-honggfuzz-address-x86_64": + grep -v .zip$ Step #12 - "compile-honggfuzz-address-x86_64": + ls /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer /workspace/out/honggfuzz-address-x86_64/fuzz_dump /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape /workspace/out/honggfuzz-address-x86_64/fuzz_element /workspace/out/honggfuzz-address-x86_64/fuzz_implementations /workspace/out/honggfuzz-address-x86_64/fuzz_minify /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand /workspace/out/honggfuzz-address-x86_64/fuzz_padded /workspace/out/honggfuzz-address-x86_64/fuzz_parser /workspace/out/honggfuzz-address-x86_64/fuzz_print_json /workspace/out/honggfuzz-address-x86_64/fuzz_utf8 Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_dump Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_dump.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_element Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_element.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_implementations Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_implementations.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_minify Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_minify.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_padded Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_padded.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_parser Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_parser.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_print_json Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_print_json.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_utf8 Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_utf8.zip Finished Step #12 - "compile-honggfuzz-address-x86_64" Starting Step #13 - "build-check-honggfuzz-address-x86_64" Step #13 - "build-check-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_padded Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_minifyimpl Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_element Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_parser Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_atpointer Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_print_json Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_dump Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_utf8 Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_implementations Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_minify Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_ondemand Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_dump_raw_tape Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwet2tz6t/fuzz_ndjson Finished Step #13 - "build-check-honggfuzz-address-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/simdjson Step #15: adding: fuzz_atpointer (deflated 66%) Step #15: adding: fuzz_atpointer.zip (stored 0%) Step #15: adding: fuzz_dump (deflated 67%) Step #15: adding: fuzz_dump.zip (stored 0%) Step #15: adding: fuzz_dump_raw_tape (deflated 67%) Step #15: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #15: adding: fuzz_element (deflated 67%) Step #15: adding: fuzz_element.zip (stored 0%) Step #15: adding: fuzz_implementations (deflated 67%) Step #15: adding: fuzz_implementations.zip (stored 0%) Step #15: adding: fuzz_minify (deflated 66%) Step #15: adding: fuzz_minify.zip (stored 0%) Step #15: adding: fuzz_minifyimpl (deflated 67%) Step #15: adding: fuzz_minifyimpl.zip (stored 0%) Step #15: adding: fuzz_ndjson (deflated 66%) Step #15: adding: fuzz_ndjson.zip (stored 0%) Step #15: adding: fuzz_ondemand (deflated 66%) Step #15: adding: fuzz_ondemand.zip (stored 0%) Step #15: adding: fuzz_padded (deflated 67%) Step #15: adding: fuzz_padded.zip (stored 0%) Step #15: adding: fuzz_parser (deflated 66%) Step #15: adding: fuzz_parser.zip (stored 0%) Step #15: adding: fuzz_print_json (deflated 67%) Step #15: adding: fuzz_print_json.zip (stored 0%) Step #15: adding: fuzz_utf8 (deflated 67%) Step #15: adding: fuzz_utf8.zip (stored 0%) Step #15: adding: honggfuzz (deflated 66%) Step #15: adding: llvm-symbolizer (deflated 65%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 906 --:--:-- --:--:-- --:--:-- 907 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 26.6M 0 0 100 26.6M 0 94.2M --:--:-- --:--:-- --:--:-- 94.4M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 706 --:--:-- --:--:-- --:--:-- 708 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: Step #19: ***** NOTICE ***** Step #19: Step #19: Supported `curl` versions can be found in the various images available at Step #19: https://console.cloud.google.com/launcher/details/google/ubuntu1604. Step #19: Step #19: ***** END OF NOTICE ***** Step #19: Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 170 --:--:-- --:--:-- --:--:-- 170 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #20 Starting Step #21 - "compile-libfuzzer-address-x86_64" Step #21 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #21 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": CC=clang Step #21 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #21 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #21 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #21 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": + fuzz/ossfuzz.sh Step #21 - "compile-libfuzzer-address-x86_64": + which zip Step #21 - "compile-libfuzzer-address-x86_64": + which cmake Step #21 - "compile-libfuzzer-address-x86_64": + which ninja Step #21 - "compile-libfuzzer-address-x86_64": + fuzz/build_corpus.sh Step #21 - "compile-libfuzzer-address-x86_64": + mkdir -p build Step #21 - "compile-libfuzzer-address-x86_64": + cd build Step #21 - "compile-libfuzzer-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #21 - "compile-libfuzzer-address-x86_64": -- The CXX compiler identification is Clang 22.0.0 Step #21 - "compile-libfuzzer-address-x86_64": -- The C compiler identification is Clang 22.0.0 Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compiler ABI info Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compiler ABI info - done Step #21 - "compile-libfuzzer-address-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compile features Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compile features - done Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compiler ABI info Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compiler ABI info - done Step #21 - "compile-libfuzzer-address-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compile features Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compile features - done Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for fork Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for fork - found Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for wait Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for wait - found Step #21 - "compile-libfuzzer-address-x86_64": -- Adding -Og to compile flag Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #21 - "compile-libfuzzer-address-x86_64": -- Found Threads: TRUE Step #21 - "compile-libfuzzer-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #21 - "compile-libfuzzer-address-x86_64": -- CPM: Adding package cxxopts@ () Step #21 - "compile-libfuzzer-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #21 - "compile-libfuzzer-address-x86_64": -- Found Python3: /usr/local/bin/python3.11 (found version "3.11.13") found components: Interpreter Step #21 - "compile-libfuzzer-address-x86_64": -- Including amalgamate_demo test. Step #21 - "compile-libfuzzer-address-x86_64": -- Including simdjson-singleheader test. Step #21 - "compile-libfuzzer-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #21 - "compile-libfuzzer-address-x86_64": -- compiler id: Clang version: 22.0.0 Step #21 - "compile-libfuzzer-address-x86_64": -- We disable the checkperf targets under Ninja. Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 - Success Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE - Success Step #21 - "compile-libfuzzer-address-x86_64": -- Configuring done (4.5s) Step #21 - "compile-libfuzzer-address-x86_64": -- Generating done (0.1s) Step #21 - "compile-libfuzzer-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #21 - "compile-libfuzzer-address-x86_64": + cmake --build . --target all_fuzzers Step #21 - "compile-libfuzzer-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_ondemand [19/28] Linking CXX executable fuzz/fuzz_parser [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_element [22/28] Linking CXX executable fuzz/fuzz_padded [23/28] Linking CXX executable fuzz/fuzz_minifyimpl [24/28] Linking CXX executable fuzz/fuzz_dump [25/28] Linking CXX executable fuzz/fuzz_print_json [26/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [27/28] Linking CXX executable fuzz/fuzz_utf8 [28/28] Linking CXX executable fuzz/fuzz_implementations Step #21 - "compile-libfuzzer-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-address-x86_64 Step #21 - "compile-libfuzzer-address-x86_64": + ls /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer /workspace/out/libfuzzer-address-x86_64/fuzz_dump /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-address-x86_64/fuzz_element /workspace/out/libfuzzer-address-x86_64/fuzz_implementations /workspace/out/libfuzzer-address-x86_64/fuzz_minify /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand /workspace/out/libfuzzer-address-x86_64/fuzz_padded+ /workspace/out/libfuzzer-address-x86_64/fuzz_parser /workspace/out/libfuzzer-address-x86_64/fuzz_print_json /workspace/out/libfuzzer-address-x86_64/fuzz_utf8 Step #21 - "compile-libfuzzer-address-x86_64": grep -v .zip$ Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_dump Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_dump.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_element Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_element.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_implementations Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_implementations.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_minify Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_minify.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_padded Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_padded.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_parser Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_parser.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_print_json Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_print_json.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_utf8 Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_utf8.zip Finished Step #21 - "compile-libfuzzer-address-x86_64" Starting Step #22 - "build-check-libfuzzer-address-x86_64" Step #22 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_padded Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_minifyimpl Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_element Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_parser Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_atpointer Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_print_json Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_dump Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_utf8 Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_implementations Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_minify Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_ondemand Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_dump_raw_tape Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpag4jm_sp/fuzz_ndjson Finished Step #22 - "build-check-libfuzzer-address-x86_64" Starting Step #23 Step #23: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #23 Starting Step #24 Step #24: Already have image: gcr.io/oss-fuzz/simdjson Step #24: adding: fuzz_atpointer (deflated 66%) Step #24: adding: fuzz_atpointer.zip (stored 0%) Step #24: adding: fuzz_dump (deflated 67%) Step #24: adding: fuzz_dump.zip (stored 0%) Step #24: adding: fuzz_dump_raw_tape (deflated 67%) Step #24: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #24: adding: fuzz_element (deflated 67%) Step #24: adding: fuzz_element.zip (stored 0%) Step #24: adding: fuzz_implementations (deflated 67%) Step #24: adding: fuzz_implementations.zip (stored 0%) Step #24: adding: fuzz_minify (deflated 66%) Step #24: adding: fuzz_minify.zip (stored 0%) Step #24: adding: fuzz_minifyimpl (deflated 67%) Step #24: adding: fuzz_minifyimpl.zip (stored 0%) Step #24: adding: fuzz_ndjson (deflated 66%) Step #24: adding: fuzz_ndjson.zip (stored 0%) Step #24: adding: fuzz_ondemand (deflated 67%) Step #24: adding: fuzz_ondemand.zip (stored 0%) Step #24: adding: fuzz_padded (deflated 67%) Step #24: adding: fuzz_padded.zip (stored 0%) Step #24: adding: fuzz_parser (deflated 66%) Step #24: adding: fuzz_parser.zip (stored 0%) Step #24: adding: fuzz_print_json (deflated 67%) Step #24: adding: fuzz_print_json.zip (stored 0%) Step #24: adding: fuzz_utf8 (deflated 67%) Step #24: adding: fuzz_utf8.zip (stored 0%) Step #24: adding: llvm-symbolizer (deflated 65%) Finished Step #24 Starting Step #25 Step #25: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #25: % Total % Received % Xferd Average Speed Time Time Time Current Step #25: Dload Upload Total Spent Left Speed Step #25: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 827 --:--:-- --:--:-- --:--:-- 830 Finished Step #25 Starting Step #26 Step #26: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #26: % Total % Received % Xferd Average Speed Time Time Time Current Step #26: Dload Upload Total Spent Left Speed Step #26: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 84 35.0M 0 0 84 29.7M 0 132M --:--:-- --:--:-- --:--:-- 132M 100 35.0M 0 0 100 35.0M 0 75.9M --:--:-- --:--:-- --:--:-- 75.8M Finished Step #26 Starting Step #27 Step #27: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #27: % Total % Received % Xferd Average Speed Time Time Time Current Step #27: Dload Upload Total Spent Left Speed Step #27: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 885 --:--:-- --:--:-- --:--:-- 883 100 182 0 0 100 182 0 737 --:--:-- --:--:-- --:--:-- 736 Finished Step #27 Starting Step #28 Step #28: Already have image (with digest): gcr.io/cloud-builders/curl Step #28: % Total % Received % Xferd Average Speed Time Time Time Current Step #28: Dload Upload Total Spent Left Speed Step #28: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 157 --:--:-- --:--:-- --:--:-- 157 Finished Step #28 Starting Step #29 Step #29: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #29 Starting Step #30 - "compile-libfuzzer-memory-x86_64" Step #30 - "compile-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #30 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-memory-x86_64": vm.mmap_rnd_bits = 28 Step #30 - "compile-libfuzzer-memory-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #30 - "compile-libfuzzer-memory-x86_64": Building without MSan instrumented libraries. Step #30 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-memory-x86_64": CC=clang Step #30 - "compile-libfuzzer-memory-x86_64": CXX=clang++ Step #30 - "compile-libfuzzer-memory-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link Step #30 - "compile-libfuzzer-memory-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ Step #30 - "compile-libfuzzer-memory-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=memory -Cdebuginfo=1 -Cforce-frame-pointers Step #30 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-memory-x86_64": + fuzz/ossfuzz.sh Step #30 - "compile-libfuzzer-memory-x86_64": + which zip Step #30 - "compile-libfuzzer-memory-x86_64": + which cmake Step #30 - "compile-libfuzzer-memory-x86_64": + which ninja Step #30 - "compile-libfuzzer-memory-x86_64": + fuzz/build_corpus.sh Step #30 - "compile-libfuzzer-memory-x86_64": + mkdir -p build Step #30 - "compile-libfuzzer-memory-x86_64": + cd build Step #30 - "compile-libfuzzer-memory-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #30 - "compile-libfuzzer-memory-x86_64": -- The CXX compiler identification is Clang 22.0.0 Step #30 - "compile-libfuzzer-memory-x86_64": -- The C compiler identification is Clang 22.0.0 Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compiler ABI info Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compiler ABI info - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compile features Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compile features - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compiler ABI info Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compiler ABI info - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compile features Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compile features - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for fork Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for fork - found Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for wait Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for wait - found Step #30 - "compile-libfuzzer-memory-x86_64": -- Adding -Og to compile flag Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #30 - "compile-libfuzzer-memory-x86_64": -- Found Threads: TRUE Step #30 - "compile-libfuzzer-memory-x86_64": -- CPM: Adding package simdjson-data@ () Step #30 - "compile-libfuzzer-memory-x86_64": -- CPM: Adding package cxxopts@ () Step #30 - "compile-libfuzzer-memory-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #30 - "compile-libfuzzer-memory-x86_64": -- Found Python3: /usr/local/bin/python3.11 (found version "3.11.13") found components: Interpreter Step #30 - "compile-libfuzzer-memory-x86_64": -- Including amalgamate_demo test. Step #30 - "compile-libfuzzer-memory-x86_64": -- Including simdjson-singleheader test. Step #30 - "compile-libfuzzer-memory-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #30 - "compile-libfuzzer-memory-x86_64": -- compiler id: Clang version: 22.0.0 Step #30 - "compile-libfuzzer-memory-x86_64": -- We disable the checkperf targets under Ninja. Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 - Success Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE - Success Step #30 - "compile-libfuzzer-memory-x86_64": -- Configuring done (4.2s) Step #30 - "compile-libfuzzer-memory-x86_64": -- Generating done (0.1s) Step #30 - "compile-libfuzzer-memory-x86_64": -- Build files have been written to: /src/simdjson/build Step #30 - "compile-libfuzzer-memory-x86_64": + cmake --build . --target all_fuzzers Step #30 - "compile-libfuzzer-memory-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_parser [18/28] Linking CXX executable fuzz/fuzz_ondemand [19/28] Linking CXX executable fuzz/fuzz_minify [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [23/28] Linking CXX executable fuzz/fuzz_dump [24/28] Linking CXX executable fuzz/fuzz_element [25/28] Linking CXX executable fuzz/fuzz_utf8 [26/28] Linking CXX executable fuzz/fuzz_implementations [27/28] Linking CXX executable fuzz/fuzz_print_json [28/28] Linking CXX executable fuzz/fuzz_minifyimpl Step #30 - "compile-libfuzzer-memory-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-memory-x86_64 Step #30 - "compile-libfuzzer-memory-x86_64": + ls /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer /workspace/out/libfuzzer-memory-x86_64/fuzz_dump /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-memory-x86_64/fuzz_element /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations /workspace/out/libfuzzer-memory-x86_64/fuzz_minify /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand /workspace/out/libfuzzer-memory-x86_64/fuzz_padded /workspace/out/libfuzzer-memory-x86_64/fuzz_parser /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8 Step #30 - "compile-libfuzzer-memory-x86_64": + grep -v .zip$ Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_dump Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_dump.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_element Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_element.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_minify Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_minify.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_padded Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_padded.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_parser Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_parser.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8 Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8.zip Finished Step #30 - "compile-libfuzzer-memory-x86_64" Starting Step #31 - "build-check-libfuzzer-memory-x86_64" Step #31 - "build-check-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_padded Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_minifyimpl Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_element Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_parser Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_atpointer Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_print_json Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_dump Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_utf8 Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_implementations Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_minify Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_ondemand Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_dump_raw_tape Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_ndjson Step #31 - "build-check-libfuzzer-memory-x86_64": Retrying failed fuzz targets sequentially 4 Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_padded Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_minifyimpl Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_ondemand Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmphvk574xz/fuzz_ndjson Step #31 - "build-check-libfuzzer-memory-x86_64": Broken fuzz targets 4 Step #31 - "build-check-libfuzzer-memory-x86_64": ('/tmp/not-out/tmphvk574xz/fuzz_padded', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmphvk574xz/fuzz_padded'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_padded seems to have only partial coverage instrumentation.\nBAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_padded seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmphvk574xz/fuzz_padded -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (89 inline 8-bit counters): 89 [0x5605dc9bd0f8, 0x5605dc9bd151), \nINFO: Loaded 1 PC tables (89 PCs): 89 [0x5605dc9bd158,0x5605dc9bd6e8), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\n==398==WARNING: MemorySanitizer: use-of-uninitialized-value\n #0 0x5605dc81ad19 in LLVMFuzzerTestOneInput /src/simdjson/include/simdjson/padded_string-inl.h\n #1 0x5605dc7030ad in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #2 0x5605dc7047b1 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #3 0x5605dc704d28 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #4 0x5605dc6f3bb5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #5 0x5605dc71f822 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #6 0x7f3c0da99082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n #7 0x5605dc6e6f0d in _start (/tmp/not-out/tmphvk574xz/fuzz_padded+0x68f0d)\n\nDEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&)\n Member fields were destroyed\n #0 0x5605dc7bba2d in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5\n #1 0x5605dc81a5c2 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string.h:147:10\n #2 0x5605dc81a5c2 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string-inl.h:119:1\n #3 0x5605dc81a5c2 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_padded.cpp:18:3\n #4 0x5605dc7030ad in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #5 0x5605dc7047b1 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #6 0x5605dc704d28 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #7 0x5605dc6f3bb5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #8 0x5605dc71f822 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #9 0x7f3c0da99082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n\nDEDUP_TOKEN: __sanitizer_dtor_callback_fields--simdjson::padded_string::~padded_string()--simdjson::padded_string::~padded_string()\nSUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/include/simdjson/padded_string-inl.h in LLVMFuzzerTestOneInput\nUnique heap origins: 19\nStack depot allocated bytes: 9764880\nUnique origin histories: 4\nHistory depot allocated bytes: 196608\nExiting\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #31 - "build-check-libfuzzer-memory-x86_64": BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_padded seems to have only partial coverage instrumentation. Step #31 - "build-check-libfuzzer-memory-x86_64": BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_padded seems to have either startup crash or exit: Step #31 - "build-check-libfuzzer-memory-x86_64": vm.mmap_rnd_bits = 28 Step #31 - "build-check-libfuzzer-memory-x86_64": /tmp/not-out/tmphvk574xz/fuzz_padded -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Seed: 1337 Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 modules (89 inline 8-bit counters): 89 [0x55615f4de0f8, 0x55615f4de151), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 PC tables (89 PCs): 89 [0x55615f4de158,0x55615f4de6e8), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #31 - "build-check-libfuzzer-memory-x86_64": ==547==WARNING: MemorySanitizer: use-of-uninitialized-value Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x55615f33bd19 in LLVMFuzzerTestOneInput /src/simdjson/include/simdjson/padded_string-inl.h Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x55615f2240ad in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x55615f2257b1 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x55615f225d28 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x55615f214bb5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x55615f240822 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x7f725cd76082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x55615f207f0d in _start (/tmp/not-out/tmphvk574xz/fuzz_padded+0x68f0d) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) Step #31 - "build-check-libfuzzer-memory-x86_64": Member fields were destroyed Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x55615f2dca2d in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x55615f33b5c2 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string.h:147:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x55615f33b5c2 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string-inl.h:119:1 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x55615f33b5c2 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_padded.cpp:18:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x55615f2240ad in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x55615f2257b1 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x55615f225d28 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x55615f214bb5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #8 0x55615f240822 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #9 0x7f725cd76082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: __sanitizer_dtor_callback_fields--simdjson::padded_string::~padded_string()--simdjson::padded_string::~padded_string() Step #31 - "build-check-libfuzzer-memory-x86_64": SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/include/simdjson/padded_string-inl.h in LLVMFuzzerTestOneInput Step #31 - "build-check-libfuzzer-memory-x86_64": Unique heap origins: 19 Step #31 - "build-check-libfuzzer-memory-x86_64": Stack depot allocated bytes: 9764880 Step #31 - "build-check-libfuzzer-memory-x86_64": Unique origin histories: 4 Step #31 - "build-check-libfuzzer-memory-x86_64": History depot allocated bytes: 196608 Step #31 - "build-check-libfuzzer-memory-x86_64": Exiting Step #31 - "build-check-libfuzzer-memory-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #31 - "build-check-libfuzzer-memory-x86_64": Base64: Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": ('/tmp/not-out/tmphvk574xz/fuzz_minifyimpl', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmphvk574xz/fuzz_minifyimpl'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_minifyimpl seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmphvk574xz/fuzz_minifyimpl -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (6369 inline 8-bit counters): 6369 [0x55fa9108ac30, 0x55fa9108c511), \nINFO: Loaded 1 PC tables (6369 PCs): 6369 [0x55fa9108c518,0x55fa910a5328), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\n==505==WARNING: MemorySanitizer: use-of-uninitialized-value\n #0 0x55fa90e17a2b in std::__1::vector>::_ConstructTransaction::~_ConstructTransaction[abi:ne220000]() /usr/local/bin/../include/c++/v1/__vector/vector.h\n #1 0x55fa90e17a2b in std::__1::vector>::__construct_at_end(unsigned long) /usr/local/bin/../include/c++/v1/__vector/vector.h:931:1\n #2 0x55fa90e17a2b in std::__1::vector>::vector[abi:ne220000](unsigned long) /usr/local/bin/../include/c++/v1/__vector/vector.h:151:7\n #3 0x55fa90e16c67 in LLVMFuzzerTestOneInput::$_0::operator()(simdjson::implementation const*) const /src/simdjson/fuzz/fuzz_minifyimpl.cpp:26:16\n #4 0x55fa90e15954 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_minifyimpl.cpp:42:26\n #5 0x55fa90cff14d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #6 0x55fa90d00851 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #7 0x55fa90d00dc8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #8 0x55fa90cefc55 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #9 0x55fa90d1b8c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #10 0x7f2fbb55f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n #11 0x55fa90ce2fad in _start (/tmp/not-out/tmphvk574xz/fuzz_minifyimpl+0x8efad)\n\nDEDUP_TOKEN: std::__1::vector>::_ConstructTransaction::~_ConstructTransaction[abi:ne220000]()--std::__1::vector>::__construct_at_end(unsigned long)--std::__1::vector>::vector[abi:ne220000](unsigned long)\n Member fields were destroyed\n #0 0x55fa90db7acd in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5\n #1 0x55fa90e17926 in std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]() /usr/local/bin/../include/c++/v1/__utility/exception_guard.h:89:13\n #2 0x55fa90e17926 in std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]() /usr/local/bin/../include/c++/v1/__utility/exception_guard.h:86:3\n #3 0x55fa90e17926 in std::__1::vector>::vector[abi:ne220000](unsigned long) /usr/local/bin/../include/c++/v1/__vector/vector.h:154:3\n #4 0x55fa90e16c67 in LLVMFuzzerTestOneInput::$_0::operator()(simdjson::implementation const*) const /src/simdjson/fuzz/fuzz_minifyimpl.cpp:26:16\n #5 0x55fa90e15954 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_minifyimpl.cpp:42:26\n #6 0x55fa90cff14d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #7 0x55fa90d00851 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #8 0x55fa90d00dc8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #9 0x55fa90cefc55 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #10 0x55fa90d1b8c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #11 0x7f2fbb55f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n\nDEDUP_TOKEN: __sanitizer_dtor_callback_fields--std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]()--std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]()\nSUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/fuzz/fuzz_minifyimpl.cpp:26:16 in LLVMFuzzerTestOneInput::$_0::operator()(simdjson::implementation const*) const\nUnique heap origins: 144\nStack depot allocated bytes: 9764880\nUnique origin histories: 4\nHistory depot allocated bytes: 196608\nExiting\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #31 - "build-check-libfuzzer-memory-x86_64": BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_minifyimpl seems to have either startup crash or exit: Step #31 - "build-check-libfuzzer-memory-x86_64": vm.mmap_rnd_bits = 28 Step #31 - "build-check-libfuzzer-memory-x86_64": /tmp/not-out/tmphvk574xz/fuzz_minifyimpl -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Seed: 1337 Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 modules (6369 inline 8-bit counters): 6369 [0x561676457c30, 0x561676459511), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 PC tables (6369 PCs): 6369 [0x561676459518,0x561676472328), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #31 - "build-check-libfuzzer-memory-x86_64": ==583==WARNING: MemorySanitizer: use-of-uninitialized-value Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x5616761e4a2b in std::__1::vector>::_ConstructTransaction::~_ConstructTransaction[abi:ne220000]() /usr/local/bin/../include/c++/v1/__vector/vector.h Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x5616761e4a2b in std::__1::vector>::__construct_at_end(unsigned long) /usr/local/bin/../include/c++/v1/__vector/vector.h:931:1 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x5616761e4a2b in std::__1::vector>::vector[abi:ne220000](unsigned long) /usr/local/bin/../include/c++/v1/__vector/vector.h:151:7 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x5616761e3c67 in LLVMFuzzerTestOneInput::$_0::operator()(simdjson::implementation const*) const /src/simdjson/fuzz/fuzz_minifyimpl.cpp:26:16 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x5616761e2954 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_minifyimpl.cpp:42:26 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x5616760cc14d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x5616760cd851 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x5616760cddc8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #8 0x5616760bcc55 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #9 0x5616760e88c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #10 0x7f0d6f27e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": #11 0x5616760affad in _start (/tmp/not-out/tmphvk574xz/fuzz_minifyimpl+0x8efad) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: std::__1::vector>::_ConstructTransaction::~_ConstructTransaction[abi:ne220000]()--std::__1::vector>::__construct_at_end(unsigned long)--std::__1::vector>::vector[abi:ne220000](unsigned long) Step #31 - "build-check-libfuzzer-memory-x86_64": Member fields were destroyed Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x561676184acd in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x5616761e4926 in std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]() /usr/local/bin/../include/c++/v1/__utility/exception_guard.h:89:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x5616761e4926 in std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]() /usr/local/bin/../include/c++/v1/__utility/exception_guard.h:86:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x5616761e4926 in std::__1::vector>::vector[abi:ne220000](unsigned long) /usr/local/bin/../include/c++/v1/__vector/vector.h:154:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x5616761e3c67 in LLVMFuzzerTestOneInput::$_0::operator()(simdjson::implementation const*) const /src/simdjson/fuzz/fuzz_minifyimpl.cpp:26:16 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x5616761e2954 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_minifyimpl.cpp:42:26 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x5616760cc14d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x5616760cd851 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #8 0x5616760cddc8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #9 0x5616760bcc55 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #10 0x5616760e88c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #11 0x7f0d6f27e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: __sanitizer_dtor_callback_fields--std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]()--std::__1::__exception_guard_exceptions>::__destroy_vector>::~__exception_guard_exceptions[abi:ne220000]() Step #31 - "build-check-libfuzzer-memory-x86_64": SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/fuzz/fuzz_minifyimpl.cpp:26:16 in LLVMFuzzerTestOneInput::$_0::operator()(simdjson::implementation const*) const Step #31 - "build-check-libfuzzer-memory-x86_64": Unique heap origins: 144 Step #31 - "build-check-libfuzzer-memory-x86_64": Stack depot allocated bytes: 9764880 Step #31 - "build-check-libfuzzer-memory-x86_64": Unique origin histories: 4 Step #31 - "build-check-libfuzzer-memory-x86_64": History depot allocated bytes: 196608 Step #31 - "build-check-libfuzzer-memory-x86_64": Exiting Step #31 - "build-check-libfuzzer-memory-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #31 - "build-check-libfuzzer-memory-x86_64": Base64: Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": ('/tmp/not-out/tmphvk574xz/fuzz_ondemand', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmphvk574xz/fuzz_ondemand'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_ondemand seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmphvk574xz/fuzz_ondemand -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (6633 inline 8-bit counters): 6633 [0x55a30d716c58, 0x55a30d718641), \nINFO: Loaded 1 PC tables (6633 PCs): 6633 [0x55a30d718648,0x55a30d7324d8), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\n==347==WARNING: MemorySanitizer: use-of-uninitialized-value\n #0 0x55a30d58268e in LLVMFuzzerTestOneInput /src/simdjson/include/simdjson/padded_string-inl.h\n #1 0x55a30d461e4d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #2 0x55a30d463551 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #3 0x55a30d463ac8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #4 0x55a30d452955 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #5 0x55a30d47e5c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #6 0x7f90d09c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n #7 0x55a30d445cad in _start (/tmp/not-out/tmphvk574xz/fuzz_ondemand+0x86cad)\n\nDEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&)\n Member fields were destroyed\n #0 0x55a30d51a7cd in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5\n #1 0x55a30d5816d9 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string.h:147:10\n #2 0x55a30d5816d9 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string-inl.h:119:1\n #3 0x55a30d5816d9 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_ondemand.cpp:69:3\n #4 0x55a30d461e4d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #5 0x55a30d463551 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #6 0x55a30d463ac8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #7 0x55a30d452955 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #8 0x55a30d47e5c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #9 0x7f90d09c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n\nDEDUP_TOKEN: __sanitizer_dtor_callback_fields--simdjson::padded_string::~padded_string()--simdjson::padded_string::~padded_string()\nSUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/include/simdjson/padded_string-inl.h in LLVMFuzzerTestOneInput\nUnique heap origins: 42\nStack depot allocated bytes: 9764880\nUnique origin histories: 4\nHistory depot allocated bytes: 196608\nExiting\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #31 - "build-check-libfuzzer-memory-x86_64": BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_ondemand seems to have either startup crash or exit: Step #31 - "build-check-libfuzzer-memory-x86_64": vm.mmap_rnd_bits = 28 Step #31 - "build-check-libfuzzer-memory-x86_64": /tmp/not-out/tmphvk574xz/fuzz_ondemand -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Seed: 1337 Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 modules (6633 inline 8-bit counters): 6633 [0x55bc53b6fc58, 0x55bc53b71641), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 PC tables (6633 PCs): 6633 [0x55bc53b71648,0x55bc53b8b4d8), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #31 - "build-check-libfuzzer-memory-x86_64": ==619==WARNING: MemorySanitizer: use-of-uninitialized-value Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x55bc539db68e in LLVMFuzzerTestOneInput /src/simdjson/include/simdjson/padded_string-inl.h Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x55bc538bae4d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x55bc538bc551 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x55bc538bcac8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x55bc538ab955 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x55bc538d75c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x7fac3f250082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x55bc5389ecad in _start (/tmp/not-out/tmphvk574xz/fuzz_ondemand+0x86cad) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) Step #31 - "build-check-libfuzzer-memory-x86_64": Member fields were destroyed Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x55bc539737cd in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x55bc539da6d9 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string.h:147:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x55bc539da6d9 in simdjson::padded_string::~padded_string() /src/simdjson/include/simdjson/padded_string-inl.h:119:1 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x55bc539da6d9 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_ondemand.cpp:69:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x55bc538bae4d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x55bc538bc551 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x55bc538bcac8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x55bc538ab955 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #8 0x55bc538d75c2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #9 0x7fac3f250082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: __sanitizer_dtor_callback_fields--simdjson::padded_string::~padded_string()--simdjson::padded_string::~padded_string() Step #31 - "build-check-libfuzzer-memory-x86_64": SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/include/simdjson/padded_string-inl.h in LLVMFuzzerTestOneInput Step #31 - "build-check-libfuzzer-memory-x86_64": Unique heap origins: 42 Step #31 - "build-check-libfuzzer-memory-x86_64": Stack depot allocated bytes: 9764880 Step #31 - "build-check-libfuzzer-memory-x86_64": Unique origin histories: 4 Step #31 - "build-check-libfuzzer-memory-x86_64": History depot allocated bytes: 196608 Step #31 - "build-check-libfuzzer-memory-x86_64": Exiting Step #31 - "build-check-libfuzzer-memory-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #31 - "build-check-libfuzzer-memory-x86_64": Base64: Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": ('/tmp/not-out/tmphvk574xz/fuzz_ndjson', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmphvk574xz/fuzz_ndjson'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_ndjson seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmphvk574xz/fuzz_ndjson -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (6465 inline 8-bit counters): 6465 [0x56449ea40b90, 0x56449ea424d1), \nINFO: Loaded 1 PC tables (6465 PCs): 6465 [0x56449ea424d8,0x56449ea5b8e8), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\n==410==WARNING: MemorySanitizer: use-of-uninitialized-value\n #0 0x56449e891594 in simdjson::dom::stage1_worker::stop_thread() /usr/local/bin/../include/c++/v1/__mutex/unique_lock.h\n #1 0x56449e891712 in simdjson::dom::stage1_worker::~stage1_worker() /src/simdjson/include/simdjson/dom/document_stream-inl.h:29:3\n #2 0x56449e891712 in std::__1::default_delete::operator()[abi:ne220000](simdjson::dom::stage1_worker*) const /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:77:5\n #3 0x56449e891712 in std::__1::unique_ptr>::reset[abi:ne220000](simdjson::dom::stage1_worker*) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:290:7\n #4 0x56449e891712 in std::__1::unique_ptr>::operator=[abi:ne220000](std::__1::unique_ptr>&&) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:230:5\n #5 0x56449e8896a0 in simdjson::dom::document_stream::operator=(simdjson::dom::document_stream&&) /src/simdjson/include/simdjson/dom/document_stream.h:86:88\n #6 0x56449e8896a0 in simdjson::internal::simdjson_result_base::tie(simdjson::dom::document_stream&, simdjson::error_code&) && /src/simdjson/include/simdjson/error-inl.h:54:11\n #7 0x56449e8896a0 in simdjson::internal::simdjson_result_base::get(simdjson::dom::document_stream&) && /src/simdjson/include/simdjson/error-inl.h:61:48\n #8 0x56449e8896a0 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_ndjson.cpp:15:41\n #9 0x56449e772f2d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #10 0x56449e774631 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #11 0x56449e774ba8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #12 0x56449e763a35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #13 0x56449e78f6a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #14 0x7f2213b96082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n #15 0x56449e756d8d in _start (/tmp/not-out/tmphvk574xz/fuzz_ndjson+0x86d8d)\n\nDEDUP_TOKEN: simdjson::dom::stage1_worker::stop_thread()--simdjson::dom::stage1_worker::~stage1_worker()--std::__1::default_delete::operator()[abi:ne220000](simdjson::dom::stage1_worker*) const\n Member fields were destroyed\n #0 0x56449e82b8ad in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5\n #1 0x56449e89144a in std::__1::unique_lock::~unique_lock[abi:ne220000]() /usr/local/bin/../include/c++/v1/__mutex/unique_lock.h:33:15\n #2 0x56449e89144a in std::__1::unique_lock::~unique_lock[abi:ne220000]() /usr/local/bin/../include/c++/v1/__mutex/unique_lock.h:64:3\n #3 0x56449e89144a in simdjson::dom::stage1_worker::stop_thread() /src/simdjson/include/simdjson/dom/document_stream-inl.h:72:1\n #4 0x56449e891712 in simdjson::dom::stage1_worker::~stage1_worker() /src/simdjson/include/simdjson/dom/document_stream-inl.h:29:3\n #5 0x56449e891712 in std::__1::default_delete::operator()[abi:ne220000](simdjson::dom::stage1_worker*) const /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:77:5\n #6 0x56449e891712 in std::__1::unique_ptr>::reset[abi:ne220000](simdjson::dom::stage1_worker*) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:290:7\n #7 0x56449e891712 in std::__1::unique_ptr>::operator=[abi:ne220000](std::__1::unique_ptr>&&) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:230:5\n #8 0x56449e8896a0 in simdjson::dom::document_stream::operator=(simdjson::dom::document_stream&&) /src/simdjson/include/simdjson/dom/document_stream.h:86:88\n #9 0x56449e8896a0 in simdjson::internal::simdjson_result_base::tie(simdjson::dom::document_stream&, simdjson::error_code&) && /src/simdjson/include/simdjson/error-inl.h:54:11\n #10 0x56449e8896a0 in simdjson::internal::simdjson_result_base::get(simdjson::dom::document_stream&) && /src/simdjson/include/simdjson/error-inl.h:61:48\n #11 0x56449e8896a0 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_ndjson.cpp:15:41\n #12 0x56449e772f2d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #13 0x56449e774631 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #14 0x56449e774ba8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #15 0x56449e763a35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #16 0x56449e78f6a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #17 0x7f2213b96082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d)\n\nDEDUP_TOKEN: __sanitizer_dtor_callback_fields--std::__1::unique_lock::~unique_lock[abi:ne220000]()--std::__1::unique_lock::~unique_lock[abi:ne220000]()\nSUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/include/simdjson/dom/document_stream-inl.h:29:3 in simdjson::dom::stage1_worker::~stage1_worker()\nUnique heap origins: 34\nStack depot allocated bytes: 9764880\nUnique origin histories: 7\nHistory depot allocated bytes: 196608\nExiting\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #31 - "build-check-libfuzzer-memory-x86_64": BAD BUILD: /tmp/not-out/tmphvk574xz/fuzz_ndjson seems to have either startup crash or exit: Step #31 - "build-check-libfuzzer-memory-x86_64": vm.mmap_rnd_bits = 28 Step #31 - "build-check-libfuzzer-memory-x86_64": /tmp/not-out/tmphvk574xz/fuzz_ndjson -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Seed: 1337 Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 modules (6465 inline 8-bit counters): 6465 [0x55fca85a1b90, 0x55fca85a34d1), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: Loaded 1 PC tables (6465 PCs): 6465 [0x55fca85a34d8,0x55fca85bc8e8), Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #31 - "build-check-libfuzzer-memory-x86_64": ==655==WARNING: MemorySanitizer: use-of-uninitialized-value Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x55fca83f2594 in simdjson::dom::stage1_worker::stop_thread() /usr/local/bin/../include/c++/v1/__mutex/unique_lock.h Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x55fca83f2712 in simdjson::dom::stage1_worker::~stage1_worker() /src/simdjson/include/simdjson/dom/document_stream-inl.h:29:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x55fca83f2712 in std::__1::default_delete::operator()[abi:ne220000](simdjson::dom::stage1_worker*) const /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:77:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x55fca83f2712 in std::__1::unique_ptr>::reset[abi:ne220000](simdjson::dom::stage1_worker*) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:290:7 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x55fca83f2712 in std::__1::unique_ptr>::operator=[abi:ne220000](std::__1::unique_ptr>&&) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:230:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x55fca83ea6a0 in simdjson::dom::document_stream::operator=(simdjson::dom::document_stream&&) /src/simdjson/include/simdjson/dom/document_stream.h:86:88 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x55fca83ea6a0 in simdjson::internal::simdjson_result_base::tie(simdjson::dom::document_stream&, simdjson::error_code&) && /src/simdjson/include/simdjson/error-inl.h:54:11 Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x55fca83ea6a0 in simdjson::internal::simdjson_result_base::get(simdjson::dom::document_stream&) && /src/simdjson/include/simdjson/error-inl.h:61:48 Step #31 - "build-check-libfuzzer-memory-x86_64": #8 0x55fca83ea6a0 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_ndjson.cpp:15:41 Step #31 - "build-check-libfuzzer-memory-x86_64": #9 0x55fca82d3f2d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #10 0x55fca82d5631 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #11 0x55fca82d5ba8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #12 0x55fca82c4a35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #13 0x55fca82f06a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #14 0x7f436f3a6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": #15 0x55fca82b7d8d in _start (/tmp/not-out/tmphvk574xz/fuzz_ndjson+0x86d8d) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: simdjson::dom::stage1_worker::stop_thread()--simdjson::dom::stage1_worker::~stage1_worker()--std::__1::default_delete::operator()[abi:ne220000](simdjson::dom::stage1_worker*) const Step #31 - "build-check-libfuzzer-memory-x86_64": Member fields were destroyed Step #31 - "build-check-libfuzzer-memory-x86_64": #0 0x55fca838c8ad in __sanitizer_dtor_callback_fields /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:1074:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #1 0x55fca83f244a in std::__1::unique_lock::~unique_lock[abi:ne220000]() /usr/local/bin/../include/c++/v1/__mutex/unique_lock.h:33:15 Step #31 - "build-check-libfuzzer-memory-x86_64": #2 0x55fca83f244a in std::__1::unique_lock::~unique_lock[abi:ne220000]() /usr/local/bin/../include/c++/v1/__mutex/unique_lock.h:64:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #3 0x55fca83f244a in simdjson::dom::stage1_worker::stop_thread() /src/simdjson/include/simdjson/dom/document_stream-inl.h:72:1 Step #31 - "build-check-libfuzzer-memory-x86_64": #4 0x55fca83f2712 in simdjson::dom::stage1_worker::~stage1_worker() /src/simdjson/include/simdjson/dom/document_stream-inl.h:29:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #5 0x55fca83f2712 in std::__1::default_delete::operator()[abi:ne220000](simdjson::dom::stage1_worker*) const /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:77:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #6 0x55fca83f2712 in std::__1::unique_ptr>::reset[abi:ne220000](simdjson::dom::stage1_worker*) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:290:7 Step #31 - "build-check-libfuzzer-memory-x86_64": #7 0x55fca83f2712 in std::__1::unique_ptr>::operator=[abi:ne220000](std::__1::unique_ptr>&&) /usr/local/bin/../include/c++/v1/__memory/unique_ptr.h:230:5 Step #31 - "build-check-libfuzzer-memory-x86_64": #8 0x55fca83ea6a0 in simdjson::dom::document_stream::operator=(simdjson::dom::document_stream&&) /src/simdjson/include/simdjson/dom/document_stream.h:86:88 Step #31 - "build-check-libfuzzer-memory-x86_64": #9 0x55fca83ea6a0 in simdjson::internal::simdjson_result_base::tie(simdjson::dom::document_stream&, simdjson::error_code&) && /src/simdjson/include/simdjson/error-inl.h:54:11 Step #31 - "build-check-libfuzzer-memory-x86_64": #10 0x55fca83ea6a0 in simdjson::internal::simdjson_result_base::get(simdjson::dom::document_stream&) && /src/simdjson/include/simdjson/error-inl.h:61:48 Step #31 - "build-check-libfuzzer-memory-x86_64": #11 0x55fca83ea6a0 in LLVMFuzzerTestOneInput /src/simdjson/fuzz/fuzz_ndjson.cpp:15:41 Step #31 - "build-check-libfuzzer-memory-x86_64": #12 0x55fca82d3f2d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #31 - "build-check-libfuzzer-memory-x86_64": #13 0x55fca82d5631 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #14 0x55fca82d5ba8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #31 - "build-check-libfuzzer-memory-x86_64": #15 0x55fca82c4a35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #31 - "build-check-libfuzzer-memory-x86_64": #16 0x55fca82f06a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #31 - "build-check-libfuzzer-memory-x86_64": #17 0x7f436f3a6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": DEDUP_TOKEN: __sanitizer_dtor_callback_fields--std::__1::unique_lock::~unique_lock[abi:ne220000]()--std::__1::unique_lock::~unique_lock[abi:ne220000]() Step #31 - "build-check-libfuzzer-memory-x86_64": SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/simdjson/include/simdjson/dom/document_stream-inl.h:29:3 in simdjson::dom::stage1_worker::~stage1_worker() Step #31 - "build-check-libfuzzer-memory-x86_64": Unique heap origins: 34 Step #31 - "build-check-libfuzzer-memory-x86_64": Stack depot allocated bytes: 9764880 Step #31 - "build-check-libfuzzer-memory-x86_64": Unique origin histories: 7 Step #31 - "build-check-libfuzzer-memory-x86_64": History depot allocated bytes: 196608 Step #31 - "build-check-libfuzzer-memory-x86_64": Exiting Step #31 - "build-check-libfuzzer-memory-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #31 - "build-check-libfuzzer-memory-x86_64": Base64: Step #31 - "build-check-libfuzzer-memory-x86_64": Step #31 - "build-check-libfuzzer-memory-x86_64": ERROR: 30.76923076923077% of fuzz targets seem to be broken. See the list above for a detailed information. Step #31 - "build-check-libfuzzer-memory-x86_64": Build check automatically passing because of ignored targets. Finished Step #31 - "build-check-libfuzzer-memory-x86_64" Starting Step #32 Step #32: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #32 Starting Step #33 Step #33: Already have image: gcr.io/oss-fuzz/simdjson Step #33: adding: crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 (stored 0%) Step #33: adding: fuzz_atpointer (deflated 65%) Step #33: adding: fuzz_atpointer.zip (stored 0%) Step #33: adding: fuzz_dump (deflated 65%) Step #33: adding: fuzz_dump.zip (stored 0%) Step #33: adding: fuzz_dump_raw_tape (deflated 65%) Step #33: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #33: adding: fuzz_element (deflated 65%) Step #33: adding: fuzz_element.zip (stored 0%) Step #33: adding: fuzz_implementations (deflated 65%) Step #33: adding: fuzz_implementations.zip (stored 0%) Step #33: adding: fuzz_minify (deflated 65%) Step #33: adding: fuzz_minify.zip (stored 0%) Step #33: adding: fuzz_minifyimpl (deflated 65%) Step #33: adding: fuzz_minifyimpl.zip (stored 0%) Step #33: adding: fuzz_ndjson (deflated 65%) Step #33: adding: fuzz_ndjson.zip (stored 0%) Step #33: adding: fuzz_ondemand (deflated 65%) Step #33: adding: fuzz_ondemand.zip (stored 0%) Step #33: adding: fuzz_padded (deflated 66%) Step #33: adding: fuzz_padded.zip (stored 0%) Step #33: adding: fuzz_parser (deflated 65%) Step #33: adding: fuzz_parser.zip (stored 0%) Step #33: adding: fuzz_print_json (deflated 65%) Step #33: adding: fuzz_print_json.zip (stored 0%) Step #33: adding: fuzz_utf8 (deflated 65%) Step #33: adding: fuzz_utf8.zip (stored 0%) Step #33: adding: llvm-symbolizer (deflated 65%) Finished Step #33 Starting Step #34 Step #34: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #34: % Total % Received % Xferd Average Speed Time Time Time Current Step #34: Dload Upload Total Spent Left Speed Step #34: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 838 --:--:-- --:--:-- --:--:-- 839 Finished Step #34 Starting Step #35 Step #35: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #35: % Total % Received % Xferd Average Speed Time Time Time Current Step #35: Dload Upload Total Spent Left Speed Step #35: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 42 42.1M 0 0 42 18.0M 0 142M --:--:-- --:--:-- --:--:-- 141M 100 42.1M 0 0 100 42.1M 0 61.5M --:--:-- --:--:-- --:--:-- 61.5M Finished Step #35 Starting Step #36 Step #36: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #36: % Total % Received % Xferd Average Speed Time Time Time Current Step #36: Dload Upload Total Spent Left Speed Step #36: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 755 --:--:-- --:--:-- --:--:-- 758 Finished Step #36 Starting Step #37 Step #37: Already have image (with digest): gcr.io/cloud-builders/curl Step #37: % Total % Received % Xferd Average Speed Time Time Time Current Step #37: Dload Upload Total Spent Left Speed Step #37: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32 0 0 100 32 0 164 --:--:-- --:--:-- --:--:-- 164 100 32 0 0 100 32 0 164 --:--:-- --:--:-- --:--:-- 164 Finished Step #37 Starting Step #38 Step #38: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #38 Starting Step #39 - "compile-libfuzzer-undefined-x86_64" Step #39 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #39 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #39 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #39 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #39 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #39 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function Step #39 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ Step #39 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #39 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-undefined-x86_64": + fuzz/ossfuzz.sh Step #39 - "compile-libfuzzer-undefined-x86_64": + which zip Step #39 - "compile-libfuzzer-undefined-x86_64": + which cmake Step #39 - "compile-libfuzzer-undefined-x86_64": + which ninja Step #39 - "compile-libfuzzer-undefined-x86_64": + fuzz/build_corpus.sh Step #39 - "compile-libfuzzer-undefined-x86_64": + mkdir -p build Step #39 - "compile-libfuzzer-undefined-x86_64": + cd build Step #39 - "compile-libfuzzer-undefined-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #39 - "compile-libfuzzer-undefined-x86_64": -- The CXX compiler identification is Clang 22.0.0 Step #39 - "compile-libfuzzer-undefined-x86_64": -- The C compiler identification is Clang 22.0.0 Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compiler ABI info Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compiler ABI info - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compile features Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compile features - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compiler ABI info Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compiler ABI info - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compile features Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compile features - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for fork Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for fork - found Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for wait Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for wait - found Step #39 - "compile-libfuzzer-undefined-x86_64": -- Adding -Og to compile flag Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #39 - "compile-libfuzzer-undefined-x86_64": -- Found Threads: TRUE Step #39 - "compile-libfuzzer-undefined-x86_64": -- CPM: Adding package simdjson-data@ () Step #39 - "compile-libfuzzer-undefined-x86_64": -- CPM: Adding package cxxopts@ () Step #39 - "compile-libfuzzer-undefined-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #39 - "compile-libfuzzer-undefined-x86_64": -- Found Python3: /usr/local/bin/python3.11 (found version "3.11.13") found components: Interpreter Step #39 - "compile-libfuzzer-undefined-x86_64": -- Including amalgamate_demo test. Step #39 - "compile-libfuzzer-undefined-x86_64": -- Including simdjson-singleheader test. Step #39 - "compile-libfuzzer-undefined-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #39 - "compile-libfuzzer-undefined-x86_64": -- compiler id: Clang version: 22.0.0 Step #39 - "compile-libfuzzer-undefined-x86_64": -- We disable the checkperf targets under Ninja. Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test SIMDJSON_COMPILER_SUPPORTS_CXX20 - Success Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test SIMDJSON_SUPPORTS_MARCH_NATIVE - Success Step #39 - "compile-libfuzzer-undefined-x86_64": -- Configuring done (3.7s) Step #39 - "compile-libfuzzer-undefined-x86_64": -- Generating done (0.1s) Step #39 - "compile-libfuzzer-undefined-x86_64": -- Build files have been written to: /src/simdjson/build Step #39 - "compile-libfuzzer-undefined-x86_64": + cmake --build . --target all_fuzzers Step #39 - "compile-libfuzzer-undefined-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_parser [19/28] Linking CXX executable fuzz/fuzz_ondemand [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_dump [23/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [24/28] Linking CXX executable fuzz/fuzz_utf8 [25/28] Linking CXX executable fuzz/fuzz_print_json [26/28] Linking CXX executable fuzz/fuzz_minifyimpl [27/28] Linking CXX executable fuzz/fuzz_implementations [28/28] Linking CXX executable fuzz/fuzz_element Step #39 - "compile-libfuzzer-undefined-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-undefined-x86_64 Step #39 - "compile-libfuzzer-undefined-x86_64": + ls /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-undefined-x86_64/fuzz_element /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8 Step #39 - "compile-libfuzzer-undefined-x86_64": + grep -v .zip$ Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_element Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_element.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8 Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8.zip Finished Step #39 - "compile-libfuzzer-undefined-x86_64" Starting Step #40 - "build-check-libfuzzer-undefined-x86_64" Step #40 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_padded Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_minifyimpl Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_element Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_parser Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_atpointer Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_print_json Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_dump Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_utf8 Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_implementations Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_minify Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_ondemand Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_dump_raw_tape Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp5al37v_k/fuzz_ndjson Finished Step #40 - "build-check-libfuzzer-undefined-x86_64" Starting Step #41 Step #41: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #41 Starting Step #42 Step #42: Already have image: gcr.io/oss-fuzz/simdjson Step #42: adding: fuzz_atpointer (deflated 66%) Step #42: adding: fuzz_atpointer.zip (stored 0%) Step #42: adding: fuzz_dump (deflated 67%) Step #42: adding: fuzz_dump.zip (stored 0%) Step #42: adding: fuzz_dump_raw_tape (deflated 67%) Step #42: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #42: adding: fuzz_element (deflated 67%) Step #42: adding: fuzz_element.zip (stored 0%) Step #42: adding: fuzz_implementations (deflated 67%) Step #42: adding: fuzz_implementations.zip (stored 0%) Step #42: adding: fuzz_minify (deflated 67%) Step #42: adding: fuzz_minify.zip (stored 0%) Step #42: adding: fuzz_minifyimpl (deflated 67%) Step #42: adding: fuzz_minifyimpl.zip (stored 0%) Step #42: adding: fuzz_ndjson (deflated 66%) Step #42: adding: fuzz_ndjson.zip (stored 0%) Step #42: adding: fuzz_ondemand (deflated 67%) Step #42: adding: fuzz_ondemand.zip (stored 0%) Step #42: adding: fuzz_padded (deflated 66%) Step #42: adding: fuzz_padded.zip (stored 0%) Step #42: adding: fuzz_parser (deflated 66%) Step #42: adding: fuzz_parser.zip (stored 0%) Step #42: adding: fuzz_print_json (deflated 67%) Step #42: adding: fuzz_print_json.zip (stored 0%) Step #42: adding: fuzz_utf8 (deflated 67%) Step #42: adding: fuzz_utf8.zip (stored 0%) Step #42: adding: llvm-symbolizer (deflated 65%) Finished Step #42 Starting Step #43 Step #43: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #43: % Total % Received % Xferd Average Speed Time Time Time Current Step #43: Dload Upload Total Spent Left Speed Step #43: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 907 --:--:-- --:--:-- --:--:-- 912 Finished Step #43 Starting Step #44 Step #44: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #44: % Total % Received % Xferd Average Speed Time Time Time Current Step #44: Dload Upload Total Spent Left Speed Step #44: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 26.3M 0 0 100 26.3M 0 56.9M --:--:-- --:--:-- --:--:-- 56.9M Finished Step #44 Starting Step #45 Step #45: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #45: % Total % Received % Xferd Average Speed Time Time Time Current Step #45: Dload Upload Total Spent Left Speed Step #45: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 763 --:--:-- --:--:-- --:--:-- 764 Finished Step #45 Starting Step #46 Step #46: Already have image (with digest): gcr.io/cloud-builders/curl Step #46: % Total % Received % Xferd Average Speed Time Time Time Current Step #46: Dload Upload Total Spent Left Speed Step #46: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 35 0 0 100 35 0 181 --:--:-- --:--:-- --:--:-- 180 100 35 0 0 100 35 0 181 --:--:-- --:--:-- --:--:-- 180 Finished Step #46 Starting Step #47 Step #47: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #47 PUSH DONE