starting build "c29a52fd-d6f2-4559-b275-ad51b5ee4dec" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: d6641bc2fa43: Pulling fs layer Step #1: 03b5b87691ba: Pulling fs layer Step #1: 481e95a54f41: Pulling fs layer Step #1: c983f0dd8a5b: Pulling fs layer Step #1: 59d51d6132d4: Pulling fs layer Step #1: fa8a1033f66e: Pulling fs layer Step #1: 46f399b0c07a: Pulling fs layer Step #1: cb1a02ecf7eb: Pulling fs layer Step #1: 44d1c0b995dd: Pulling fs layer Step #1: f51f31c5e83f: Pulling fs layer Step #1: c208884563e1: Pulling fs layer Step #1: 5f615c78ea9d: Pulling fs layer Step #1: 9ca630b961e0: Pulling fs layer Step #1: cab768a9c406: Pulling fs layer Step #1: b1bd74dc8ce4: Pulling fs layer Step #1: 5b8d8a2a2c75: Pulling fs layer Step #1: c72e51c5f60e: Pulling fs layer Step #1: d05ee186c236: Pulling fs layer Step #1: 481e95a54f41: Waiting Step #1: 7d9b75b033f6: Pulling fs layer Step #1: 31071b4a38fe: Pulling fs layer Step #1: 0ef712248544: Pulling fs layer Step #1: 28c670fb58d0: Pulling fs layer Step #1: be2117db5438: Pulling fs layer Step #1: 86ba68682473: Pulling fs layer Step #1: 59d51d6132d4: Waiting Step #1: b345295bf971: Pulling fs layer Step #1: dd619879a5ab: Pulling fs layer Step #1: c983f0dd8a5b: Waiting Step #1: 946f09dc0a2b: Pulling fs layer Step #1: 05f4f45a5220: Pulling fs layer Step #1: 2bd23e01cc06: Pulling fs layer Step #1: f1377cd867cb: Pulling fs layer Step #1: 34c774e6b8b1: Pulling fs layer Step #1: 50f39b78b7cb: Pulling fs layer Step #1: 20f813295d24: Pulling fs layer Step #1: fa8a1033f66e: Waiting Step #1: c72e51c5f60e: Waiting Step #1: d05ee186c236: Waiting Step #1: 46f399b0c07a: Waiting Step #1: 7d9b75b033f6: Waiting Step #1: cb1a02ecf7eb: Waiting Step #1: 31071b4a38fe: Waiting Step #1: 44d1c0b995dd: Waiting Step #1: 0ef712248544: Waiting Step #1: f51f31c5e83f: Waiting Step #1: 28c670fb58d0: Waiting Step #1: be2117db5438: Waiting Step #1: 86ba68682473: Waiting Step #1: c208884563e1: Waiting Step #1: b345295bf971: Waiting Step #1: 5f615c78ea9d: Waiting Step #1: 9ca630b961e0: Waiting Step #1: cab768a9c406: Waiting Step #1: dd619879a5ab: Waiting Step #1: 34c774e6b8b1: Waiting Step #1: b1bd74dc8ce4: Waiting Step #1: 5b8d8a2a2c75: Waiting Step #1: 50f39b78b7cb: Waiting Step #1: 946f09dc0a2b: Waiting Step #1: 20f813295d24: Waiting Step #1: f1377cd867cb: Waiting Step #1: 2bd23e01cc06: Waiting Step #1: 05f4f45a5220: Waiting Step #1: 03b5b87691ba: Verifying Checksum Step #1: 03b5b87691ba: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: c983f0dd8a5b: Verifying Checksum Step #1: c983f0dd8a5b: Download complete Step #1: 481e95a54f41: Verifying Checksum Step #1: 481e95a54f41: Download complete Step #1: 59d51d6132d4: Verifying Checksum Step #1: 59d51d6132d4: Download complete Step #1: 46f399b0c07a: Verifying Checksum Step #1: 46f399b0c07a: Download complete Step #1: d6641bc2fa43: Verifying Checksum Step #1: d6641bc2fa43: Download complete Step #1: cb1a02ecf7eb: Verifying Checksum Step #1: cb1a02ecf7eb: Download complete Step #1: b549f31133a9: Pull complete Step #1: f51f31c5e83f: Verifying Checksum Step #1: f51f31c5e83f: Download complete Step #1: c208884563e1: Verifying Checksum Step #1: c208884563e1: Download complete Step #1: 5f615c78ea9d: Download complete Step #1: 9ca630b961e0: Verifying Checksum Step #1: 9ca630b961e0: Download complete Step #1: cab768a9c406: Verifying Checksum Step #1: cab768a9c406: Download complete Step #1: b1bd74dc8ce4: Verifying Checksum Step #1: b1bd74dc8ce4: Download complete Step #1: 44d1c0b995dd: Verifying Checksum Step #1: 44d1c0b995dd: Download complete Step #1: c72e51c5f60e: Download complete Step #1: 5b8d8a2a2c75: Verifying Checksum Step #1: 5b8d8a2a2c75: Download complete Step #1: d05ee186c236: Verifying Checksum Step #1: d05ee186c236: Download complete Step #1: 7d9b75b033f6: Verifying Checksum Step #1: 7d9b75b033f6: Download complete Step #1: 0ef712248544: Download complete Step #1: 31071b4a38fe: Verifying Checksum Step #1: 31071b4a38fe: Download complete Step #1: 28c670fb58d0: Verifying Checksum Step #1: 28c670fb58d0: Download complete Step #1: be2117db5438: Verifying Checksum Step #1: be2117db5438: Download complete Step #1: fa8a1033f66e: Verifying Checksum Step #1: fa8a1033f66e: Download complete Step #1: 86ba68682473: Download complete Step #1: b345295bf971: Verifying Checksum Step #1: b345295bf971: Download complete Step #1: 946f09dc0a2b: Verifying Checksum Step #1: 946f09dc0a2b: Download complete Step #1: dd619879a5ab: Verifying Checksum Step #1: dd619879a5ab: Download complete Step #1: 05f4f45a5220: Verifying Checksum Step #1: 05f4f45a5220: Download complete Step #1: f1377cd867cb: Verifying Checksum Step #1: f1377cd867cb: Download complete Step #1: 2bd23e01cc06: Verifying Checksum Step #1: 2bd23e01cc06: Download complete Step #1: 34c774e6b8b1: Download complete Step #1: 50f39b78b7cb: Verifying Checksum Step #1: 50f39b78b7cb: Download complete Step #1: d6641bc2fa43: Pull complete Step #1: 20f813295d24: Verifying Checksum Step #1: 20f813295d24: Download complete Step #1: 03b5b87691ba: Pull complete Step #1: 481e95a54f41: Pull complete Step #1: c983f0dd8a5b: Pull complete Step #1: 59d51d6132d4: Pull complete Step #1: fa8a1033f66e: Pull complete Step #1: 46f399b0c07a: Pull complete Step #1: cb1a02ecf7eb: Pull complete Step #1: 44d1c0b995dd: Pull complete Step #1: f51f31c5e83f: Pull complete Step #1: c208884563e1: Pull complete Step #1: 5f615c78ea9d: Pull complete Step #1: 9ca630b961e0: Pull complete Step #1: cab768a9c406: Pull complete Step #1: b1bd74dc8ce4: Pull complete Step #1: 5b8d8a2a2c75: Pull complete Step #1: c72e51c5f60e: Pull complete Step #1: d05ee186c236: Pull complete Step #1: 7d9b75b033f6: Pull complete Step #1: 31071b4a38fe: Pull complete Step #1: 0ef712248544: Pull complete Step #1: 28c670fb58d0: Pull complete Step #1: be2117db5438: Pull complete Step #1: 86ba68682473: Pull complete Step #1: b345295bf971: Pull complete Step #1: dd619879a5ab: Pull complete Step #1: 946f09dc0a2b: Pull complete Step #1: 05f4f45a5220: Pull complete Step #1: 2bd23e01cc06: Pull complete Step #1: f1377cd867cb: Pull complete Step #1: 34c774e6b8b1: Pull complete Step #1: 50f39b78b7cb: Pull complete Step #1: 20f813295d24: Pull complete Step #1: Digest: sha256:1eb4d4636963aa5e396198f0bdbc22ed98dc4d1f32badf92ed57d8f66854a84c Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 12e0a8e89dc4 Step #1: Step 2/6 : RUN apt-get update && apt-get install -y make cmake autoconf pkg-config libtool Step #1: ---> Running in d5c610e5001b Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:3 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Get:5 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [4219 kB] Step #1: Get:6 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [1047 kB] Step #1: Fetched 5649 kB in 2s (3491 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: automake autotools-dev cmake-data file libarchive13 libglib2.0-0 Step #1: libglib2.0-data libicu66 libjsoncpp1 libltdl-dev libltdl7 libmagic-mgc Step #1: libmagic1 librhash0 libsigsegv2 libuv1 libxml2 m4 shared-mime-info Step #1: xdg-user-dirs Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext cmake-doc ninja-build Step #1: lrzip libtool-doc gfortran | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev cmake cmake-data file libarchive13 Step #1: libglib2.0-0 libglib2.0-data libicu66 libjsoncpp1 libltdl-dev libltdl7 Step #1: libmagic-mgc libmagic1 librhash0 libsigsegv2 libtool libuv1 libxml2 m4 Step #1: pkg-config shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 24 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 18.6 MB of archives. Step #1: After this operation, 85.5 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.8 [1289 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.8 [5848 B] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.8 [640 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.4 [327 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 18.6 MB in 1s (33.7 MB/s) Step #1: Selecting previously unselected package libmagic-mgc. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../03-libglib2.0-0_2.64.6-1~ubuntu20.04.8_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../04-libglib2.0-data_2.64.6-1~ubuntu20.04.8_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../05-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../06-libxml2_2.9.10+dfsg-5ubuntu0.20.04.8_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.8) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../07-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../08-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../09-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../10-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../11-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../12-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../13-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../14-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../15-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../16-libarchive13_3.4.0-2ubuntu1.4_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../17-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../18-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../19-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../20-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../21-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../22-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../23-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.8) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container d5c610e5001b Step #1: ---> 37a82612809e Step #1: Step 3/6 : RUN git clone https://github.com/vstakhov/libucl Step #1: ---> Running in c584994cd9cc Step #1: Cloning into 'libucl'... Step #1: Removing intermediate container c584994cd9cc Step #1: ---> 52d1a074cd9e Step #1: Step 4/6 : WORKDIR $SRC Step #1: ---> Running in b8e2d9c3e56a Step #1: Removing intermediate container b8e2d9c3e56a Step #1: ---> b13135508d55 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> 15ab470513d7 Step #1: Step 6/6 : COPY ucl_add_string_fuzzer.options $SRC/ucl_add_string_fuzzer.options Step #1: ---> 7daf6337530b Step #1: Successfully built 7daf6337530b Step #1: Successfully tagged gcr.io/oss-fuzz/libucl:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/libucl Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file8k34dN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libucl/.git Step #2 - "srcmap": + GIT_DIR=/src/libucl Step #2 - "srcmap": + cd /src/libucl Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/vstakhov/libucl Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=5c58d0d5b939daf6f0c389e15019319f138636c2 Step #2 - "srcmap": + jq_inplace /tmp/file8k34dN '."/src/libucl" = { type: "git", url: "https://github.com/vstakhov/libucl", rev: "5c58d0d5b939daf6f0c389e15019319f138636c2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filetZqf0b Step #2 - "srcmap": + cat /tmp/file8k34dN Step #2 - "srcmap": + jq '."/src/libucl" = { type: "git", url: "https://github.com/vstakhov/libucl", rev: "5c58d0d5b939daf6f0c389e15019319f138636c2" }' Step #2 - "srcmap": + mv /tmp/filetZqf0b /tmp/file8k34dN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file8k34dN Step #2 - "srcmap": + rm /tmp/file8k34dN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/libucl": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/vstakhov/libucl", Step #2 - "srcmap": "rev": "5c58d0d5b939daf6f0c389e15019319f138636c2" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/ucl_add_string_fuzzer.options /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd libucl Step #3 - "compile-libfuzzer-coverage-x86_64": + ./autogen.sh Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file './ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:20: installing './ar-lib' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:18: installing './compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:21: installing './config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:21: installing './config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './missing' Step #3 - "compile-libfuzzer-coverage-x86_64": lua/Makefile.am: installing './depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing './test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C99... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking the archiver (ar) interface... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether -lc should be explicitly linked in... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for an ANSI C-conforming const... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fcntl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/param.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/mman.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stddef.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdarg.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdbool.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ctype.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for errno.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for limits.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for libgen.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdio.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for float.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for math.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for endian.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/endian.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for machine/endian.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for off_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getpagesize... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working mmap... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pandoc... /non/existent Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing clock_gettime... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing remainder... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for regex.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing regexec... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... /usr/bin/pkg-config Step #3 - "compile-libfuzzer-coverage-x86_64": checking pkg-config is at least version 0.9.0... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for GCC atomic builtins... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating lua/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tests/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating utils/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating lua/libucl.rockspec Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libucl.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating stamp-h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": make all-recursive Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libucl' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libucl/src' Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_emitter.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_emitter_streamline.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_emitter_utils.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_hash.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_parser.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_schema.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_util.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_msgpack.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libucl_la-ucl_sexp.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libucl.la Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libucl/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in tests Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libucl/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libucl/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in utils Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libucl/utils' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libucl/utils' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in doc Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libucl/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libucl/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libucl' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libucl' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libucl' Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c tests/fuzzers/ucl_add_string_fuzzer.c -DHAVE_CONFIG_H -I./src -I./include src/.libs/libucl.a -I./ -o /workspace/out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer.o Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fsanitize=fuzzer /workspace/out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer.o -DHAVE_CONFIG_H -I./src -I./include src/.libs/libucl.a -I. -o /workspace/out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: d6641bc2fa43: Already exists Step #4: 03b5b87691ba: Already exists Step #4: ae66786e7155: Pulling fs layer Step #4: 7b57b807f338: Pulling fs layer Step #4: d7336c689081: Pulling fs layer Step #4: 5a9f360ff8e9: Pulling fs layer Step #4: ea105874f1ce: Pulling fs layer Step #4: 50732a06fc93: Pulling fs layer Step #4: 83ce7a377ff2: Pulling fs layer Step #4: 50904e151635: Pulling fs layer Step #4: 5918c440cb10: Pulling fs layer Step #4: 6d1f2c78cba6: Pulling fs layer Step #4: b41829f262e1: Pulling fs layer Step #4: f39b10f98805: Pulling fs layer Step #4: a44ef8d9b1b4: Pulling fs layer Step #4: ec2f2316c11e: Pulling fs layer Step #4: fe947ae65bb3: Pulling fs layer Step #4: 33ba8cb06a3f: Pulling fs layer Step #4: 903f83013e89: Pulling fs layer Step #4: 2eef5c9e6441: Pulling fs layer Step #4: 12ba762248bc: Pulling fs layer Step #4: 954572d9f557: Pulling fs layer Step #4: 1817f26e09bd: Pulling fs layer Step #4: 5c15e70ffc3f: Pulling fs layer Step #4: 2ae44513be45: Pulling fs layer Step #4: fe947ae65bb3: Waiting Step #4: 33ba8cb06a3f: Waiting Step #4: ec2f2316c11e: Waiting Step #4: 903f83013e89: Waiting Step #4: 2eef5c9e6441: Waiting Step #4: 83ce7a377ff2: Waiting Step #4: 12ba762248bc: Waiting Step #4: 954572d9f557: Waiting Step #4: 50904e151635: Waiting Step #4: 1817f26e09bd: Waiting Step #4: 5918c440cb10: Waiting Step #4: 6d1f2c78cba6: Waiting Step #4: 5c15e70ffc3f: Waiting Step #4: b41829f262e1: Waiting Step #4: 2ae44513be45: Waiting Step #4: f39b10f98805: Waiting Step #4: ea105874f1ce: Waiting Step #4: a44ef8d9b1b4: Waiting Step #4: 5a9f360ff8e9: Waiting Step #4: 50732a06fc93: Waiting Step #4: ae66786e7155: Verifying Checksum Step #4: ae66786e7155: Download complete Step #4: 7b57b807f338: Verifying Checksum Step #4: 7b57b807f338: Download complete Step #4: ae66786e7155: Pull complete Step #4: ea105874f1ce: Verifying Checksum Step #4: ea105874f1ce: Download complete Step #4: 5a9f360ff8e9: Verifying Checksum Step #4: 5a9f360ff8e9: Download complete Step #4: 83ce7a377ff2: Verifying Checksum Step #4: 83ce7a377ff2: Download complete Step #4: 50904e151635: Verifying Checksum Step #4: 50904e151635: Download complete Step #4: 7b57b807f338: Pull complete Step #4: d7336c689081: Pull complete Step #4: 5918c440cb10: Verifying Checksum Step #4: 5918c440cb10: Download complete Step #4: 5a9f360ff8e9: Pull complete Step #4: 50732a06fc93: Verifying Checksum Step #4: 50732a06fc93: Download complete Step #4: b41829f262e1: Verifying Checksum Step #4: b41829f262e1: Download complete Step #4: ea105874f1ce: Pull complete Step #4: f39b10f98805: Verifying Checksum Step #4: f39b10f98805: Download complete Step #4: a44ef8d9b1b4: Verifying Checksum Step #4: a44ef8d9b1b4: Download complete Step #4: 6d1f2c78cba6: Verifying Checksum Step #4: 6d1f2c78cba6: Download complete Step #4: fe947ae65bb3: Download complete Step #4: ec2f2316c11e: Verifying Checksum Step #4: ec2f2316c11e: Download complete Step #4: 903f83013e89: Verifying Checksum Step #4: 903f83013e89: Download complete Step #4: 2eef5c9e6441: Download complete Step #4: 12ba762248bc: Verifying Checksum Step #4: 12ba762248bc: Download complete Step #4: 954572d9f557: Verifying Checksum Step #4: 954572d9f557: Download complete Step #4: 1817f26e09bd: Verifying Checksum Step #4: 1817f26e09bd: Download complete Step #4: 50732a06fc93: Pull complete Step #4: 5c15e70ffc3f: Verifying Checksum Step #4: 5c15e70ffc3f: Download complete Step #4: 2ae44513be45: Verifying Checksum Step #4: 2ae44513be45: Download complete Step #4: 83ce7a377ff2: Pull complete Step #4: 50904e151635: Pull complete Step #4: 5918c440cb10: Pull complete Step #4: 33ba8cb06a3f: Verifying Checksum Step #4: 33ba8cb06a3f: Download complete Step #4: 6d1f2c78cba6: Pull complete Step #4: b41829f262e1: Pull complete Step #4: f39b10f98805: Pull complete Step #4: a44ef8d9b1b4: Pull complete Step #4: ec2f2316c11e: Pull complete Step #4: fe947ae65bb3: Pull complete Step #4: 33ba8cb06a3f: Pull complete Step #4: 903f83013e89: Pull complete Step #4: 2eef5c9e6441: Pull complete Step #4: 12ba762248bc: Pull complete Step #4: 954572d9f557: Pull complete Step #4: 1817f26e09bd: Pull complete Step #4: 5c15e70ffc3f: Pull complete Step #4: 2ae44513be45: Pull complete Step #4: Digest: sha256:c3319281015d0f21406f03239e47f39e7c1b1a83a586e36659876d80e5086cc2 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running ucl_add_string_fuzzer Step #5: Error occured while running ucl_add_string_fuzzer: Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4264763127 Step #5: MERGE-OUTER: 6567 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4264790230 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: 6567 total files; 0 processed earlier; will process 6567 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: #128 pulse exec/s: 0 rss: 29Mb Step #5: #256 pulse exec/s: 0 rss: 29Mb Step #5: #512 pulse exec/s: 0 rss: 30Mb Step #5: #1024 pulse exec/s: 0 rss: 31Mb Step #5: #2048 pulse exec/s: 0 rss: 33Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==42==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x56454ea6e770 bp 0x7ffda7ab8160 sp 0x7ffda7ab8110 T42) Step #5: ==42==The signal is caused by a READ memory access. Step #5: ==42==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x56454ea6e770 in kh_put_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x56454ea6e5ef in ucl_hash_insert /src/libucl/src/ucl_hash.c:318:7 Step #5: #2 0x56454ea592f3 in ucl_hash_insert_object /src/libucl/src/./ucl_internal.h:486:7 Step #5: #3 0x56454ea592f3 in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1258:15 Step #5: #4 0x56454ea5b9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x56454ea5b9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x56454ea5ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x56454ea6a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x56454ea69f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x56454ea63faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x56454ea5d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x56454ea5ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x56454ea6a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x56454ea69f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x56454ea63faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x56454ea5d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x56454ea5ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x56454ea582c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #18 0x56454e9ba890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #19 0x56454e9c3e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #20 0x56454e9ab415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #21 0x56454e9d6842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #22 0x7f2999ad5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #23 0x56454e99dced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_put_ucl_hash_caseless_node--ucl_hash_insert--ucl_hash_insert_object Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_put_ucl_hash_caseless_node Step #5: ==42==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x3a,0x6f,0x6e,0x29,0x2f,0x2f,0x2a,0x2a,0x2f,0x2a,0x2f,0x31,0x30,0x2a, Step #5: .include(g:on)//**/*/10* Step #5: artifact_prefix='./'; Test unit written to ./crash-04d71d8a26dcd2725be1939c628f5d6b98bc7658 Step #5: Base64: LmluY2x1ZGUoZzpvbikvLyoqLyovMTAq Step #5: MERGE-OUTER: attempt 2 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4265147410 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/04d71d8a26dcd2725be1939c628f5d6b98bc7658' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3429 processed earlier; will process 3138 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==46==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x558ece9441b4 bp 0x7ffd48d56a70 sp 0x7ffd48d56a30 T46) Step #5: ==46==The signal is caused by a READ memory access. Step #5: ==46==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x558ece9441b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x558ece9440d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x558ece92e28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x558ece92e28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x558ece9309b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x558ece9309b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x558ece92fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x558ece93f71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x558ece93ef10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x558ece938faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x558ece932241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x558ece92fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x558ece93f71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x558ece93ef10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x558ece938faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x558ece932241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x558ece92fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x558ece93f71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x558ece93ef10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x558ece938faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x558ece932241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x558ece92fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x558ece92d2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x558ece88f890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x558ece898e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x558ece880415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x558ece8ab842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7fa754ed5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x558ece872ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==46==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0xa5,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a\245\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-0622a81083f72a297f53663477f5d5f6dcd11761 Step #5: Base64: LmluY2x1ZGUodCBhpQBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 3 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4265395750 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/0622a81083f72a297f53663477f5d5f6dcd11761' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3460 processed earlier; will process 3107 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==50==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x55f2c04121b4 bp 0x7ffffd8de2b0 sp 0x7ffffd8de270 T50) Step #5: ==50==The signal is caused by a READ memory access. Step #5: ==50==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x55f2c04121b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55f2c04120d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55f2c03fc28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55f2c03fc28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55f2c03fe9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55f2c03fe9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55f2c03fdb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55f2c040d71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55f2c040cf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55f2c0406faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55f2c0400241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55f2c03fdb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55f2c040d71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55f2c040cf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55f2c0406faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55f2c0400241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55f2c03fdb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55f2c040d71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55f2c040cf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55f2c0406faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55f2c0400241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55f2c03fdb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55f2c03fb2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55f2c035d890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55f2c0366e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55f2c034e415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55f2c0379842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f7b4d275082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55f2c0340ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==50==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x31,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a1\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-7bb4091003c64deac0f279bfa55de84e1ee9fff6 Step #5: Base64: LmluY2x1ZGUodCBhMQBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 4 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4265632028 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/7bb4091003c64deac0f279bfa55de84e1ee9fff6' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3469 processed earlier; will process 3098 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==54==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x564492cc8770 bp 0x7ffec54f4f00 sp 0x7ffec54f4eb0 T54) Step #5: ==54==The signal is caused by a READ memory access. Step #5: ==54==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x564492cc8770 in kh_put_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x564492cc85ef in ucl_hash_insert /src/libucl/src/ucl_hash.c:318:7 Step #5: #2 0x564492cb32f3 in ucl_hash_insert_object /src/libucl/src/./ucl_internal.h:486:7 Step #5: #3 0x564492cb32f3 in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1258:15 Step #5: #4 0x564492cb59b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x564492cb59b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x564492cb4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x564492cc471b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x564492cc3f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x564492cbdfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x564492cb7241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x564492cb4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x564492cc471b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x564492cc3f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x564492cbdfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x564492cb7241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x564492cb4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x564492cc471b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x564492cc3f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x564492cbdfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x564492cb7241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x564492cb4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x564492cb22c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x564492c14890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x564492c1de60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x564492c05415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x564492c30842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7fc9f07ca082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x564492bf7ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_put_ucl_hash_caseless_node--ucl_hash_insert--ucl_hash_insert_object Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_put_ucl_hash_caseless_node Step #5: ==54==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x32,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a2\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-892ac59becc17f61e352450584b5b0a670fbb89b Step #5: Base64: LmluY2x1ZGUodCBhMgBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 5 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4265868753 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/892ac59becc17f61e352450584b5b0a670fbb89b' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3479 processed earlier; will process 3088 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==58==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000009080100 (pc 0x55622f00d1b4 bp 0x7ffd17152ec0 sp 0x7ffd17152e80 T58) Step #5: ==58==The signal is caused by a READ memory access. Step #5: #0 0x55622f00d1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55622f00d0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55622eff728e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55622eff728e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55622eff99b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55622eff99b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55622eff8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55622f00871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55622f007f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55622f001faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55622effb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55622eff8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55622f00871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55622f007f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55622f001faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55622effb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55622eff8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55622f00871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55622f007f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55622f001faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55622effb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55622eff8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55622eff62c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55622ef58890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55622ef61e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55622ef49415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55622ef74842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7fa844ff7082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55622ef3bced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==58==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x30,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a0\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-908a6a2ad4e9a39082b9feec1755558736f450cd Step #5: Base64: LmluY2x1ZGUodCBhMABnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 6 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4266099443 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/908a6a2ad4e9a39082b9feec1755558736f450cd' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3482 processed earlier; will process 3085 files now Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==62==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00000a080080 (pc 0x5560e908a1b4 bp 0x7ffc54fccd50 sp 0x7ffc54fccd10 T62) Step #5: ==62==The signal is caused by a READ memory access. Step #5: #0 0x5560e908a1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x5560e908a0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x5560e907428e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x5560e907428e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x5560e90769b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x5560e90769b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x5560e9075b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x5560e908571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x5560e9084f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x5560e907efaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x5560e9078241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x5560e9075b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x5560e908571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x5560e9084f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x5560e907efaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x5560e9078241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x5560e9075b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x5560e908571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x5560e9084f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x5560e907efaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x5560e9078241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x5560e9075b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x5560e90732c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x5560e8fd5890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x5560e8fdee60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x5560e8fc6415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x5560e8ff1842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7ff8fb23e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x5560e8fb8ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==62==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0xa4,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a\244\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-38aabfa454e4524ed10b848006c32a70ff871bf3 Step #5: Base64: LmluY2x1ZGUodCBhpABnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 7 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4266333254 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/38aabfa454e4524ed10b848006c32a70ff871bf3' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3483 processed earlier; will process 3084 files now Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==66==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x556e9b6a71b4 bp 0x7ffd92464630 sp 0x7ffd924645f0 T66) Step #5: ==66==The signal is caused by a READ memory access. Step #5: ==66==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x556e9b6a71b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x556e9b6a70d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x556e9b69128e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x556e9b69128e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x556e9b6939b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x556e9b6939b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x556e9b692b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x556e9b6a271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x556e9b6a1f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x556e9b69bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x556e9b695241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x556e9b692b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x556e9b6a271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x556e9b6a1f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x556e9b69bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x556e9b695241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x556e9b692b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x556e9b6a271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x556e9b6a1f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x556e9b69bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x556e9b695241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x556e9b692b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x556e9b6902c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x556e9b5f2890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x556e9b5fbe60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x556e9b5e3415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x556e9b60e842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7fbff1657082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x556e9b5d5ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==66==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x63,0x30,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t c0\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-6157048562835692cbebd5b02032494c97a0aa91 Step #5: Base64: LmluY2x1ZGUodCBjMABnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 8 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4266574587 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/6157048562835692cbebd5b02032494c97a0aa91' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3490 processed earlier; will process 3077 files now Step #5: #1 pulse exec/s: 0 rss: 31Mb Step #5: #2 pulse exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==70==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x7efed6f0aed5 bp 0x632f000000000000 sp 0x7ffe726daf90 T70) Step #5: ==70==The signal is caused by a READ memory access. Step #5: ==70==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x7efed6f0aed5 in __libc_realloc (/lib/x86_64-linux-gnu/libc.so.6+0x9aed5) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #1 0x555a42dc9824 in kh_resize_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #2 0x555a42dc874a in kh_put_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #3 0x555a42dc85ef in ucl_hash_insert /src/libucl/src/ucl_hash.c:318:7 Step #5: #4 0x555a42db32f3 in ucl_hash_insert_object /src/libucl/src/./ucl_internal.h:486:7 Step #5: #5 0x555a42db32f3 in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1258:15 Step #5: #6 0x555a42db59b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #7 0x555a42db59b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #8 0x555a42db4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #9 0x555a42dc471b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #10 0x555a42dc3f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #11 0x555a42dbdfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #12 0x555a42db7241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #13 0x555a42db4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #14 0x555a42dc471b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #15 0x555a42dc3f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #16 0x555a42dbdfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #17 0x555a42db7241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #18 0x555a42db4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #19 0x555a42dc471b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #20 0x555a42dc3f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #21 0x555a42dbdfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #22 0x555a42db7241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #23 0x555a42db4b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #24 0x555a42db22c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #25 0x555a42d14890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #26 0x555a42d1de60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #27 0x555a42d05415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #28 0x555a42d30842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #29 0x7efed6e94082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #30 0x555a42cf7ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: __libc_realloc--kh_resize_ucl_hash_caseless_node--kh_put_ucl_hash_caseless_node Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x9aed5) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) in __libc_realloc Step #5: ==70==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x33,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a3\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-bd6e83206131b758979d6c494cb2054f9f83e378 Step #5: Base64: LmluY2x1ZGUodCBhMwBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 9 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4266807690 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/bd6e83206131b758979d6c494cb2054f9f83e378' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3493 processed earlier; will process 3074 files now Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==74==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000004110400 (pc 0x55d9f32701b4 bp 0x7ffc3d489240 sp 0x7ffc3d489200 T74) Step #5: ==74==The signal is caused by a READ memory access. Step #5: #0 0x55d9f32701b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55d9f32700d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55d9f325a28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55d9f325a28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55d9f325c9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55d9f325c9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55d9f325bb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55d9f326b71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55d9f326af10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55d9f3264faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55d9f325e241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55d9f325bb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55d9f326b71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55d9f326af10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55d9f3264faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55d9f325e241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55d9f325bb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55d9f326b71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55d9f326af10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55d9f3264faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55d9f325e241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55d9f325bb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55d9f32592c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55d9f31bb890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55d9f31c4e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55d9f31ac415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55d9f31d7842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f35498ca082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55d9f319eced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==74==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0xd,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a\015\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-d3ebc68b87bb1e3cf738fa42c3f1156f21d5e348 Step #5: Base64: LmluY2x1ZGUodCBhDQBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 10 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4267040433 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/d3ebc68b87bb1e3cf738fa42c3f1156f21d5e348' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3495 processed earlier; will process 3072 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==78==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x56436ac571b4 bp 0x7ffd52f95460 sp 0x7ffd52f95420 T78) Step #5: ==78==The signal is caused by a READ memory access. Step #5: ==78==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x56436ac571b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x56436ac570d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x56436ac4128e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x56436ac4128e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x56436ac439b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x56436ac439b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x56436ac42b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x56436ac5271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x56436ac51f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x56436ac4bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x56436ac45241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x56436ac42b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x56436ac5271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x56436ac51f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x56436ac4bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x56436ac45241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x56436ac42b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x56436ac5271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x56436ac51f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x56436ac4bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x56436ac45241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x56436ac42b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x56436ac402c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x56436aba2890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x56436ababe60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x56436ab93415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x56436abbe842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f50dd2d5082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x56436ab85ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==78==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0x32,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x7,0x29,0x2a, Step #5: .include(t arr2\000g\011yes\000k\011\007)* Step #5: artifact_prefix='./'; Test unit written to ./crash-37af60d085f95b48c4e6e84651c6e1be06e1b434 Step #5: Base64: LmluY2x1ZGUodCBhcnIyAGcJeWVzAGsJBykq Step #5: MERGE-OUTER: attempt 11 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4267364427 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/37af60d085f95b48c4e6e84651c6e1be06e1b434' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3571 processed earlier; will process 2996 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==82==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00006d637132 (pc 0x55df51e351b4 bp 0x7fff6c15ee00 sp 0x7fff6c15edc0 T82) Step #5: ==82==The signal is caused by a READ memory access. Step #5: #0 0x55df51e351b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55df51e350d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55df51e1f28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55df51e1f28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55df51e219b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55df51e219b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55df51e20b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55df51e3071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55df51e2ff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55df51e29faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55df51e23241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55df51e20b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55df51e3071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55df51e2ff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55df51e29faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55df51e23241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55df51e20b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55df51e3071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55df51e2ff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55df51e29faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55df51e23241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55df51e20b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55df51e1e2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55df51d80890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55df51d89e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55df51d71415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55df51d9c842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7fdd2ebbf082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55df51d63ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==82==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0x31,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x7,0x29,0x2a, Step #5: .include(t arr1\000g\011yes\000k\011\007)* Step #5: artifact_prefix='./'; Test unit written to ./crash-455879ea74556dbf0fec5645f3b0414ebd370dba Step #5: Base64: LmluY2x1ZGUodCBhcnIxAGcJeWVzAGsJBykq Step #5: MERGE-OUTER: attempt 12 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4267608311 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/455879ea74556dbf0fec5645f3b0414ebd370dba' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3582 processed earlier; will process 2985 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==86==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00006d637132 (pc 0x555b318611b4 bp 0x7fffedf14b00 sp 0x7fffedf14ac0 T86) Step #5: ==86==The signal is caused by a READ memory access. Step #5: #0 0x555b318611b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x555b318610d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x555b3184b28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x555b3184b28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x555b3184d9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x555b3184d9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x555b3184cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x555b3185c71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x555b3185bf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x555b31855faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x555b3184f241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x555b3184cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x555b3185c71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x555b3185bf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x555b31855faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x555b3184f241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x555b3184cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x555b3185c71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x555b3185bf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x555b31855faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x555b3184f241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x555b3184cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x555b3184a2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x555b317ac890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x555b317b5e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x555b3179d415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x555b317c8842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f48aec23082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x555b3178fced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==86==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0x61,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t arra\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-f37448d84435729263e54f07f25faf2370db481c Step #5: Base64: LmluY2x1ZGUodCBhcnJhAGcJeWVzAGsJCCkq Step #5: MERGE-OUTER: attempt 13 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4267839958 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/f37448d84435729263e54f07f25faf2370db481c' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3587 processed earlier; will process 2980 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==90==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x564388cee1b4 bp 0x7ffcb9262850 sp 0x7ffcb9262810 T90) Step #5: ==90==The signal is caused by a READ memory access. Step #5: ==90==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x564388cee1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x564388cee0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x564388cd828e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x564388cd828e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x564388cda9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x564388cda9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x564388cd9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x564388ce971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x564388ce8f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x564388ce2faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x564388cdc241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x564388cd9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x564388ce971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x564388ce8f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x564388ce2faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x564388cdc241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x564388cd9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x564388ce971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x564388ce8f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x564388ce2faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x564388cdc241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x564388cd9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x564388cd72c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x564388c39890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x564388c42e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x564388c2a415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x564388c55842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7fe72bca1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x564388c1cced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==90==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0x33,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x7,0x29,0x2a, Step #5: .include(t arr3\000g\011yes\000k\011\007)* Step #5: artifact_prefix='./'; Test unit written to ./crash-0cb1c13907319077e8fbe299752d2d51387ef681 Step #5: Base64: LmluY2x1ZGUodCBhcnIzAGcJeWVzAGsJBykq Step #5: MERGE-OUTER: attempt 14 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4268073012 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/0cb1c13907319077e8fbe299752d2d51387ef681' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3591 processed earlier; will process 2976 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==94==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x559432604770 bp 0x7ffeb6095670 sp 0x7ffeb6095620 T94) Step #5: ==94==The signal is caused by a READ memory access. Step #5: ==94==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x559432604770 in kh_put_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x5594326045ef in ucl_hash_insert /src/libucl/src/ucl_hash.c:318:7 Step #5: #2 0x5594325ef2f3 in ucl_hash_insert_object /src/libucl/src/./ucl_internal.h:486:7 Step #5: #3 0x5594325ef2f3 in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1258:15 Step #5: #4 0x5594325f19b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x5594325f19b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x5594325f0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55943260071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x5594325fff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x5594325f9faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x5594325f3241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x5594325f0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55943260071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x5594325fff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x5594325f9faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x5594325f3241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x5594325f0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55943260071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x5594325fff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x5594325f9faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x5594325f3241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x5594325f0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x5594325ee2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x559432550890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x559432559e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x559432541415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55943256c842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f8fe4b43082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x559432533ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_put_ucl_hash_caseless_node--ucl_hash_insert--ucl_hash_insert_object Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_put_ucl_hash_caseless_node Step #5: ==94==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x35,0x35,0x37,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a557\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-a970b65ff6eccf937624ccd32f8bc6d00f55a87e Step #5: Base64: LmluY2x1ZGUodCBhNTU3AGcJeWVzAGsJCCkq Step #5: MERGE-OUTER: attempt 15 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4268306582 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/a970b65ff6eccf937624ccd32f8bc6d00f55a87e' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3594 processed earlier; will process 2973 files now Step #5: #1 pulse exec/s: 0 rss: 31Mb Step #5: #2 pulse exec/s: 0 rss: 31Mb Step #5: #4 pulse exec/s: 0 rss: 31Mb Step #5: #8 pulse exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==98==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x56322cfca1b4 bp 0x7ffeccafd700 sp 0x7ffeccafd6c0 T98) Step #5: ==98==The signal is caused by a READ memory access. Step #5: ==98==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x56322cfca1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x56322cfca0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x56322cfb428e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x56322cfb428e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x56322cfb69b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x56322cfb69b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x56322cfb5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x56322cfc571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x56322cfc4f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x56322cfbefaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x56322cfb8241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x56322cfb5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x56322cfc571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x56322cfc4f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x56322cfbefaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x56322cfb8241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x56322cfb5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x56322cfc571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x56322cfc4f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x56322cfbefaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x56322cfb8241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x56322cfb5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x56322cfb32c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x56322cf15890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x56322cf1ee60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x56322cf06415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x56322cf31842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7fedb0095082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x56322cef8ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==98==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x84,0x31,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x7,0x29,0x2a, Step #5: .include(t ar\2041\000g\011yes\000k\011\007)* Step #5: artifact_prefix='./'; Test unit written to ./crash-5592a91741e6247e9edc86e98652cf989aa8aca3 Step #5: Base64: LmluY2x1ZGUodCBhcoQxAGcJeWVzAGsJBykq Step #5: MERGE-OUTER: attempt 16 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4268549645 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/5592a91741e6247e9edc86e98652cf989aa8aca3' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3604 processed earlier; will process 2963 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==102==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x7fe78d3aaed5 bp 0x8f60000000000000 sp 0x7ffdc07dd0c0 T102) Step #5: ==102==The signal is caused by a READ memory access. Step #5: ==102==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x7fe78d3aaed5 in __libc_realloc (/lib/x86_64-linux-gnu/libc.so.6+0x9aed5) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #1 0x55f9e090e824 in kh_resize_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #2 0x55f9e090d74a in kh_put_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #3 0x55f9e090d5ef in ucl_hash_insert /src/libucl/src/ucl_hash.c:318:7 Step #5: #4 0x55f9e08f82f3 in ucl_hash_insert_object /src/libucl/src/./ucl_internal.h:486:7 Step #5: #5 0x55f9e08f82f3 in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1258:15 Step #5: #6 0x55f9e08fa9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #7 0x55f9e08fa9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #8 0x55f9e08f9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #9 0x55f9e090971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #10 0x55f9e0908f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #11 0x55f9e0902faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #12 0x55f9e08fc241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #13 0x55f9e08f9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #14 0x55f9e090971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #15 0x55f9e0908f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #16 0x55f9e0902faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #17 0x55f9e08fc241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #18 0x55f9e08f9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #19 0x55f9e090971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #20 0x55f9e0908f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #21 0x55f9e0902faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #22 0x55f9e08fc241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #23 0x55f9e08f9b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #24 0x55f9e08f72c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #25 0x55f9e0859890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #26 0x55f9e0862e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #27 0x55f9e084a415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #28 0x55f9e0875842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #29 0x7fe78d334082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #30 0x55f9e083cced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: __libc_realloc--kh_resize_ucl_hash_caseless_node--kh_put_ucl_hash_caseless_node Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x9aed5) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) in __libc_realloc Step #5: ==102==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0x61,0xa4,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t arra\244\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-3f6243539e45daaeca7df65f837e24de9661a7a5 Step #5: Base64: LmluY2x1ZGUodCBhcnJhpABnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 17 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4268792981 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/3f6243539e45daaeca7df65f837e24de9661a7a5' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3616 processed earlier; will process 2951 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==106==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00006d63b93a (pc 0x55ad5e2ec1b4 bp 0x7ffcf218aa80 sp 0x7ffcf218aa40 T106) Step #5: ==106==The signal is caused by a READ memory access. Step #5: #0 0x55ad5e2ec1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55ad5e2ec0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55ad5e2d628e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55ad5e2d628e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55ad5e2d89b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55ad5e2d89b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55ad5e2d7b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55ad5e2e771b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55ad5e2e6f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55ad5e2e0faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55ad5e2da241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55ad5e2d7b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55ad5e2e771b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55ad5e2e6f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55ad5e2e0faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55ad5e2da241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55ad5e2d7b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55ad5e2e771b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55ad5e2e6f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55ad5e2e0faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55ad5e2da241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55ad5e2d7b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55ad5e2d52c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55ad5e237890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55ad5e240e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55ad5e228415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55ad5e253842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f4dcb328082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55ad5e21aced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==106==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0x61,0xa5,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t arra\245\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-0d73fc00a7032da28c60854abefe5a5d5b8e45e3 Step #5: Base64: LmluY2x1ZGUodCBhcnJhpQBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 18 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4269033177 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/0d73fc00a7032da28c60854abefe5a5d5b8e45e3' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3626 processed earlier; will process 2941 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==110==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000005070808 (pc 0x557df37131b4 bp 0x7ffc3c200700 sp 0x7ffc3c2006c0 T110) Step #5: ==110==The signal is caused by a READ memory access. Step #5: #0 0x557df37131b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x557df37130d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x557df36fd28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x557df36fd28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x557df36ff9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x557df36ff9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x557df36feb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x557df370e71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x557df370df10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x557df3707faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x557df3701241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x557df36feb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x557df370e71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x557df370df10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x557df3707faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x557df3701241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x557df36feb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x557df370e71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x557df370df10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x557df3707faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x557df3701241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x557df36feb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x557df36fc2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x557df365e890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x557df3667e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x557df364f415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x557df367a842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f2429bcf082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x557df3641ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==110==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x30,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0xe0,0xb9,0x80,0x9,0x8,0x29,0x2a, Step #5: .include(t a0\000g\011yes\000k\340\271\200\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-724b273f9b6d258e451bd98ceb5e37f770efd817 Step #5: Base64: LmluY2x1ZGUodCBhMABnCXllcwBr4LmACQgpKg== Step #5: MERGE-OUTER: attempt 19 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4269277007 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/724b273f9b6d258e451bd98ceb5e37f770efd817' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3648 processed earlier; will process 2919 files now Step #5: #1 pulse exec/s: 0 rss: 41Mb Step #5: #2 pulse exec/s: 0 rss: 41Mb Step #5: #4 pulse exec/s: 0 rss: 41Mb Step #5: #8 pulse exec/s: 0 rss: 41Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==114==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x55a4ec7281b4 bp 0x7ffd24f237b0 sp 0x7ffd24f23770 T114) Step #5: ==114==The signal is caused by a READ memory access. Step #5: ==114==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x55a4ec7281b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55a4ec7280d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55a4ec71228e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55a4ec71228e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55a4ec7149b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55a4ec7149b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55a4ec713b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55a4ec72371b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55a4ec722f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55a4ec71cfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55a4ec716241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55a4ec713b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55a4ec72371b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55a4ec722f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55a4ec71cfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55a4ec716241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55a4ec713b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55a4ec72371b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55a4ec722f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55a4ec71cfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55a4ec716241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55a4ec713b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55a4ec7112c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55a4ec673890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55a4ec67ce60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55a4ec664415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55a4ec68f842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f180b47c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55a4ec656ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==114==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0xe0,0xbf,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t arr\340\277\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-bf722ac31fc62d4a919b9dc51fd9fbb1288bbb1c Step #5: Base64: LmluY2x1ZGUodCBhcnLgvwBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 20 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4269810983 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/bf722ac31fc62d4a919b9dc51fd9fbb1288bbb1c' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3661 processed earlier; will process 2906 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==118==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x5557cdecd1b4 bp 0x7ffd6a276f60 sp 0x7ffd6a276f20 T118) Step #5: ==118==The signal is caused by a READ memory access. Step #5: ==118==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x5557cdecd1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x5557cdecd0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x5557cdeb728e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x5557cdeb728e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x5557cdeb99b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x5557cdeb99b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x5557cdeb8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x5557cdec871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x5557cdec7f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x5557cdec1faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x5557cdebb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x5557cdeb8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x5557cdec871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x5557cdec7f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x5557cdec1faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x5557cdebb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x5557cdeb8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x5557cdec871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x5557cdec7f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x5557cdec1faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x5557cdebb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x5557cdeb8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x5557cdeb62c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x5557cde18890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x5557cde21e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x5557cde09415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x5557cde34842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7feac27a0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x5557cddfbced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==118==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0x1c,0xbf,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t arr\034\277\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-9e0239228813b86d4b43968f8736d90ebf9eac40 Step #5: Base64: LmluY2x1ZGUodCBhcnIcvwBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 21 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4270045201 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/9e0239228813b86d4b43968f8736d90ebf9eac40' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3663 processed earlier; will process 2904 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==122==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000074633936 (pc 0x5578c6a971b4 bp 0x7ffc7e721340 sp 0x7ffc7e721300 T122) Step #5: ==122==The signal is caused by a READ memory access. Step #5: #0 0x5578c6a971b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x5578c6a970d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x5578c6a8128e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x5578c6a8128e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x5578c6a839b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x5578c6a839b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x5578c6a82b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x5578c6a9271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x5578c6a91f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x5578c6a8bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x5578c6a85241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x5578c6a82b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x5578c6a9271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x5578c6a91f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x5578c6a8bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x5578c6a85241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x5578c6a82b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x5578c6a9271b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x5578c6a91f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x5578c6a8bfaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x5578c6a85241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x5578c6a82b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x5578c6a802c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x5578c69e2890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x5578c69ebe60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x5578c69d3415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x5578c69fe842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f28e07a0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x5578c69c5ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==122==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0xe1,0xbe,0x82,0x30,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t a\341\276\2020\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-bc7bb7cb0519d57f42ba0dcc93e6d21d3eda3693 Step #5: Base64: LmluY2x1ZGUodCBh4b6CMABnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 22 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4270279413 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/bc7bb7cb0519d57f42ba0dcc93e6d21d3eda3693' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3666 processed earlier; will process 2901 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==126==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x55cb8ee3f1b4 bp 0x7fffbac5a050 sp 0x7fffbac5a010 T126) Step #5: ==126==The signal is caused by a READ memory access. Step #5: ==126==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x55cb8ee3f1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55cb8ee3f0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55cb8ee2928e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55cb8ee2928e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55cb8ee2b9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55cb8ee2b9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55cb8ee2ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55cb8ee3a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55cb8ee39f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55cb8ee33faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55cb8ee2d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55cb8ee2ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55cb8ee3a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55cb8ee39f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55cb8ee33faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55cb8ee2d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55cb8ee2ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55cb8ee3a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55cb8ee39f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55cb8ee33faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55cb8ee2d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55cb8ee2ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55cb8ee282c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55cb8ed8a890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55cb8ed93e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55cb8ed7b415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55cb8eda6842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f7a9dae9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55cb8ed6dced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==126==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x8f,0xe3,0xbf,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t ar\217\343\277\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-6175a67b68c51d3149ccd4f24a7f7ae6c31d812f Step #5: Base64: LmluY2x1ZGUodCBhco/jvwBnCXllcwBrCQgpKg== Step #5: MERGE-OUTER: attempt 23 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4270527656 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/6175a67b68c51d3149ccd4f24a7f7ae6c31d812f' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3672 processed earlier; will process 2895 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==130==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x5616c4e5e1b4 bp 0x7ffc0e707800 sp 0x7ffc0e7077c0 T130) Step #5: ==130==The signal is caused by a READ memory access. Step #5: ==130==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x5616c4e5e1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x5616c4e5e0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x5616c4e4828e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x5616c4e4828e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x5616c4e4a9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x5616c4e4a9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x5616c4e49b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x5616c4e5971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x5616c4e58f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x5616c4e52faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x5616c4e4c241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x5616c4e49b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x5616c4e5971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x5616c4e58f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x5616c4e52faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x5616c4e4c241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x5616c4e49b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x5616c4e5971b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x5616c4e58f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x5616c4e52faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x5616c4e4c241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x5616c4e49b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x5616c4e4d16b in ucl_parser_add_chunk /src/libucl/src/ucl_parser.c:3098:9 Step #5: #23 0x5616c4e4d16b in ucl_parse_macro_arguments /src/libucl/src/ucl_parser.c:2378:9 Step #5: #24 0x5616c4e4d16b in ucl_state_machine /src/libucl/src/ucl_parser.c:2650:18 Step #5: #25 0x5616c4e49b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #26 0x5616c4e472c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #27 0x5616c4da9890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #28 0x5616c4db2e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #29 0x5616c4d9a415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #30 0x5616c4dc5842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #31 0x7f04e5183082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #32 0x5616c4d8cced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==130==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x31,0xa, Step #5: .priority(.include(g\011yes){*\000)1\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-8132bdf9940e8dcca23e8dda22a3ab1499fa4db8 Step #5: Base64: LnByaW9yaXR5KC5pbmNsdWRlKGcJeWVzKXsqACkxCg== Step #5: MERGE-OUTER: attempt 24 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4270885835 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/8132bdf9940e8dcca23e8dda22a3ab1499fa4db8' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3735 processed earlier; will process 2832 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==134==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x55f3035411b4 bp 0x7ffe0b1cc980 sp 0x7ffe0b1cc940 T134) Step #5: ==134==The signal is caused by a READ memory access. Step #5: ==134==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x55f3035411b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55f3035410d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55f30352b28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55f30352b28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55f30352d9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55f30352d9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55f30352cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55f30353c71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55f30353bf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55f303535faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55f30352f241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55f30352cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55f30353c71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55f30353bf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55f303535faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55f30352f241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55f30352cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55f30353c71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55f30353bf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55f303535faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55f30352f241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55f30352cb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55f30352a2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x55f30348c890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x55f303495e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x55f30347d415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x55f3034a8842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f3b2ea91082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x55f30346fced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==134==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0xf3,0xa0,0x81,0x9f,0x72,0x61,0xa4,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0x29,0x2a, Step #5: .include(t ar\363\240\201\237ra\244\000g\011yes\000k\011\010)* Step #5: artifact_prefix='./'; Test unit written to ./crash-45cb0664110e83214b15294749e7fda494a759b4 Step #5: Base64: LmluY2x1ZGUodCBhcvOggZ9yYaQAZwl5ZXMAawkIKSo= Step #5: MERGE-OUTER: attempt 25 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4271137749 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/45cb0664110e83214b15294749e7fda494a759b4' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3761 processed earlier; will process 2806 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==138==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x562564af31b4 bp 0x7ffd87d6b550 sp 0x7ffd87d6b510 T138) Step #5: ==138==The signal is caused by a READ memory access. Step #5: ==138==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x562564af31b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x562564af30d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x562564add28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x562564add28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x562564adf9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x562564adf9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x562564adeb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x562564aee71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x562564aedf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x562564ae7faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x562564ae1241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x562564adeb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x562564aee71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x562564aedf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x562564ae7faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x562564ae1241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x562564adeb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x562564aee71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x562564aedf10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x562564ae7faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x562564ae1241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x562564adeb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x562564adc2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x562564a3e890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x562564a47e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x562564a2f415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x562564a5a842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f29e6e4f082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x562564a21ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==138==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x39,0x38,0x30,0x39,0x35,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x8,0xe2,0x80,0xa8,0x29,0x2a, Step #5: .include(t a98095\000g\011yes\000k\011\010\342\200\250)* Step #5: artifact_prefix='./'; Test unit written to ./crash-57d14301ba1157cba908cadf4602d5c7e7a1db6d Step #5: Base64: LmluY2x1ZGUodCBhOTgwOTUAZwl5ZXMAawkI4oCoKSo= Step #5: MERGE-OUTER: attempt 26 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4271725481 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/57d14301ba1157cba908cadf4602d5c7e7a1db6d' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3788 processed earlier; will process 2779 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 30Mb Step #5: #64 pulse exec/s: 0 rss: 30Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==142==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x563475b5f1b4 bp 0x7fff116430b0 sp 0x7fff11643070 T142) Step #5: ==142==The signal is caused by a READ memory access. Step #5: ==142==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x563475b5f1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x563475b5f0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x563475b4928e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x563475b4928e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x563475b4b9b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x563475b4b9b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x563475b4ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x563475b5a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x563475b59f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x563475b53faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x563475b4d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x563475b4ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x563475b5a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x563475b59f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x563475b53faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x563475b4d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x563475b4ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x563475b5a71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x563475b59f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x563475b53faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x563475b4d241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x563475b4ab50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x563475b482c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #23 0x563475aaa890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #24 0x563475ab3e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #25 0x563475a9b415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #26 0x563475ac6842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #27 0x7f7e8d02e082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #28 0x563475a8dced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==142==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x74,0x20,0x61,0x72,0x72,0xc,0x65,0x2c,0x0,0x67,0x9,0x79,0x65,0x73,0x0,0x6b,0x9,0x79,0x65,0xb4,0x0,0x6b,0x9,0x7,0x29,0x2a, Step #5: .include(t arr\014e,\000g\011yes\000k\011ye\264\000k\011\007)* Step #5: artifact_prefix='./'; Test unit written to ./crash-b673e8ab06cd19acc5c1ab8911e00af38ea86131 Step #5: Base64: LmluY2x1ZGUodCBhcnIMZSwAZwl5ZXMAawl5ZbQAawkHKSo= Step #5: MERGE-OUTER: attempt 27 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4272759981 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/b673e8ab06cd19acc5c1ab8911e00af38ea86131' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 3857 processed earlier; will process 2710 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: #128 pulse exec/s: 128 rss: 30Mb Step #5: #256 pulse exec/s: 51 rss: 45Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==146==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x562d74b09770 bp 0x7ffea78f5120 sp 0x7ffea78f50d0 T146) Step #5: ==146==The signal is caused by a READ memory access. Step #5: ==146==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x562d74b09770 in kh_put_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x562d74b095ef in ucl_hash_insert /src/libucl/src/ucl_hash.c:318:7 Step #5: #2 0x562d74af42f3 in ucl_hash_insert_object /src/libucl/src/./ucl_internal.h:486:7 Step #5: #3 0x562d74af42f3 in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1258:15 Step #5: #4 0x562d74af69b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x562d74af69b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x562d74af5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x562d74b0571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x562d74b04f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x562d74afefaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x562d74af8241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x562d74af5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x562d74b0571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x562d74b04f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x562d74afefaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x562d74af8241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x562d74af5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x562d74b0571b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x562d74b04f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x562d74afefaf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x562d74af8241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x562d74af5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x562d74af916b in ucl_parser_add_chunk /src/libucl/src/ucl_parser.c:3098:9 Step #5: #23 0x562d74af916b in ucl_parse_macro_arguments /src/libucl/src/ucl_parser.c:2378:9 Step #5: #24 0x562d74af916b in ucl_state_machine /src/libucl/src/ucl_parser.c:2650:18 Step #5: #25 0x562d74af5b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #26 0x562d74af32c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #27 0x562d74a55890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #28 0x562d74a5ee60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #29 0x562d74a46415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #30 0x562d74a71842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #31 0x7fb3f4fa2082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #32 0x562d74a38ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_put_ucl_hash_caseless_node--ucl_hash_insert--ucl_hash_insert_object Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_put_ucl_hash_caseless_node Step #5: ==146==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x30,0xa,0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x31,0xa, Step #5: .priority(.include(g\011yes){*\000)0\012.priority(.include(g\011yes){*\000)1\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-aeffb85ae66e146309cbc1422a2512f2d603455e Step #5: Base64: LnByaW9yaXR5KC5pbmNsdWRlKGcJeWVzKXsqACkwCi5wcmlvcml0eSguaW5jbHVkZShnCXllcyl7KgApMQo= Step #5: MERGE-OUTER: attempt 28 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4278929564 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/aeffb85ae66e146309cbc1422a2512f2d603455e' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 4302 processed earlier; will process 2265 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: #64 pulse exec/s: 0 rss: 41Mb Step #5: #128 pulse exec/s: 0 rss: 41Mb Step #5: #256 pulse exec/s: 0 rss: 41Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==150==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x0000661a81e9 (pc 0x55c87f6dd1b4 bp 0x7ffe8ec08800 sp 0x7ffe8ec087c0 T150) Step #5: ==150==The signal is caused by a READ memory access. Step #5: #0 0x55c87f6dd1b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x55c87f6dd0d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x55c87f6c728e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x55c87f6c728e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x55c87f6c99b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x55c87f6c99b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x55c87f6c8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x55c87f6d871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x55c87f6d7f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x55c87f6d1faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x55c87f6cb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x55c87f6c8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x55c87f6d871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x55c87f6d7f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x55c87f6d1faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x55c87f6cb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x55c87f6c8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x55c87f6d871b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x55c87f6d7f10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x55c87f6d1faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x55c87f6cb241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x55c87f6c8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x55c87f6cc16b in ucl_parser_add_chunk /src/libucl/src/ucl_parser.c:3098:9 Step #5: #23 0x55c87f6cc16b in ucl_parse_macro_arguments /src/libucl/src/ucl_parser.c:2378:9 Step #5: #24 0x55c87f6cc16b in ucl_state_machine /src/libucl/src/ucl_parser.c:2650:18 Step #5: #25 0x55c87f6c8b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #26 0x55c87f6c62c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #27 0x55c87f628890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #28 0x55c87f631e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #29 0x55c87f619415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #30 0x55c87f644842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #31 0x7f08fdf65082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #32 0x55c87f60bced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==150==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x32,0x35,0x37,0xa,0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x30,0xa,0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x31,0xa, Step #5: .priority(.include(g\011yes){*\000)257\012.priority(.include(g\011yes){*\000)0\012.priority(.include(g\011yes){*\000)1\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-ce0bd4b8afd89aa82435c2a81e240ed6ddb0f725 Step #5: Base64: LnByaW9yaXR5KC5pbmNsdWRlKGcJeWVzKXsqACkyNTcKLnByaW9yaXR5KC5pbmNsdWRlKGcJeWVzKXsqACkwCi5wcmlvcml0eSguaW5jbHVkZShnCXllcyl7KgApMQo= Step #5: MERGE-OUTER: attempt 29 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4279970550 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/ce0bd4b8afd89aa82435c2a81e240ed6ddb0f725' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 4603 processed earlier; will process 1964 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: #64 pulse exec/s: 0 rss: 30Mb Step #5: #128 pulse exec/s: 0 rss: 30Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==154==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x7fd8a35c1000 (pc 0x55d1fd243e21 bp 0x7ffe612ca9b0 sp 0x7ffe612ca970 T154) Step #5: ==154==The signal is caused by a READ memory access. Step #5: #0 0x55d1fd243e21 in ucl_skip_comments /src/libucl/src/ucl_parser.c:147:30 Step #5: #1 0x55d1fd240331 in ucl_state_machine /src/libucl/src/ucl_parser.c:2448:9 Step #5: #2 0x55d1fd23eb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #3 0x55d1fd23c2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #4 0x55d1fd19e890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #5 0x55d1fd1a7e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #6 0x55d1fd18f415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #7 0x55d1fd1ba842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #8 0x7fd8a3236082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #9 0x55d1fd181ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: ucl_skip_comments--ucl_state_machine--ucl_parser_add_chunk_full Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_parser.c:147:30 in ucl_skip_comments Step #5: ==154==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa,0x2e,0x74,0x72,0x79,0x5f,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x70,0x9,0x5b,0x6c,0x41,0x47,0x0,0x0,0x0,0x0,0x0,0x2e,0x2e,0x0,0x0,0x0,0x6e,0x6f,0x0,0x2e,0x0,0x0,0x0,0x0,0x2e,0x0,0x0,0x6c,0x6f,0x0,0x2e,0x0,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x3d,0x0,0x6c,0x6f,0x0,0x0,0x2,0x0,0x0,0x4,0x4,0x0,0x1,0x0,0x0,0x0,0x10,0x0,0x73,0x5d,0x67,0x9,0x79,0x45,0x73,0x0,0xf3,0xf3,0x72,0x65,0x3a,0x20,0x6e,0x23,0x6e,0x0,0x6b,0x9,0x6c,0x9,0x17,0x29,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0x2a,0xa,0xa,0xa,0xa,0xa,0xa,0x2a,0xef,0xbf,0xbf,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0x0,0x2e,0xa,0x0, Step #5: \012.try_include(p\011[lAG\000\000\000\000\000..\000\000\000no\000.\000\000\000\000.\000\000lo\000.\000\377\377\377\377\377\377\377=\000lo\000\000\002\000\000\004\004\000\001\000\000\000\020\000s]g\011yEs\000\363\363re: n#n\000k\011l\011\027)\012\012\012\012\012\012\012\012\012*\012\012\012\012\012\012*\357\277\277\012\012\012\012\012\012\012\000.\012\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-a9f3e1b1f51dacdf3a2ab8da727d52eca2f857f6 Step #5: Base64: Ci50cnlfaW5jbHVkZShwCVtsQUcAAAAAAC4uAAAAbm8ALgAAAAAuAABsbwAuAP////////89AGxvAAACAAAEBAABAAAAEABzXWcJeUVzAPPzcmU6IG4jbgBrCWwJFykKCgoKCgoKCgoqCgoKCgoKKu+/vwoKCgoKCgoALgoA Step #5: MERGE-OUTER: attempt 30 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4280336914 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/a9f3e1b1f51dacdf3a2ab8da727d52eca2f857f6' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 4756 processed earlier; will process 1811 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==158==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x5578ca2d51b4 bp 0x7ffcc794c350 sp 0x7ffcc794c310 T158) Step #5: ==158==The signal is caused by a READ memory access. Step #5: ==158==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x5578ca2d51b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x5578ca2d50d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x5578ca2bf28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x5578ca2bf28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x5578ca2c19b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x5578ca2c19b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x5578ca2c0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x5578ca2d071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x5578ca2cff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x5578ca2c9faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x5578ca2c3241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x5578ca2c0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x5578ca2d071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x5578ca2cff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x5578ca2c9faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x5578ca2c3241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x5578ca2c0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x5578ca2d071b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x5578ca2cff10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x5578ca2c9faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x5578ca2c3241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x5578ca2c0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x5578ca2c416b in ucl_parser_add_chunk /src/libucl/src/ucl_parser.c:3098:9 Step #5: #23 0x5578ca2c416b in ucl_parse_macro_arguments /src/libucl/src/ucl_parser.c:2378:9 Step #5: #24 0x5578ca2c416b in ucl_state_machine /src/libucl/src/ucl_parser.c:2650:18 Step #5: #25 0x5578ca2c0b50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #26 0x5578ca2be2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #27 0x5578ca220890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #28 0x5578ca229e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #29 0x5578ca211415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #30 0x5578ca23c842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #31 0x7fe6826be082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #32 0x5578ca203ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==158==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x30,0xa,0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x31,0xa,0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x30,0xa,0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0x79,0x28,0x2e,0x69,0x6e,0x63,0x6c,0x75,0x64,0x65,0x28,0x67,0x9,0x79,0x65,0x73,0x29,0x7b,0x2a,0x0,0x29,0x31,0xa,0x2e,0x70,0x72,0x69,0x6f,0x72,0x69,0x74,0xf9,0x4b,0x2e,0x69,0x6e,0x63,0x65,0x28, Step #5: .priority(.include(g\011yes){*\000)0\012.priority(.include(g\011yes){*\000)1\012.priority(.include(g\011yes){*\000)0\012.priority(.include(g\011yes){*\000)1\012.priorit\371K.ince( Step #5: artifact_prefix='./'; Test unit written to ./crash-662caf5df920f0056f9d5274ac2feab83db08ec3 Step #5: Base64: LnByaW9yaXR5KC5pbmNsdWRlKGcJeWVzKXsqACkwCi5wcmlvcml0eSguaW5jbHVkZShnCXllcyl7KgApMQoucHJpb3JpdHkoLmluY2x1ZGUoZwl5ZXMpeyoAKTAKLnByaW9yaXR5KC5pbmNsdWRlKGcJeWVzKXsqACkxCi5wcmlvcml0+UsuaW5jZSg= Step #5: MERGE-OUTER: attempt 31 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4280583118 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/662caf5df920f0056f9d5274ac2feab83db08ec3' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 4810 processed earlier; will process 1757 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: #128 pulse exec/s: 0 rss: 30Mb Step #5: #256 pulse exec/s: 0 rss: 159Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==162==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x5573a27741b4 bp 0x7ffcd1ebe380 sp 0x7ffcd1ebe340 T162) Step #5: ==162==The signal is caused by a READ memory access. Step #5: ==162==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: #0 0x5573a27741b4 in kh_get_ucl_hash_caseless_node /src/libucl/src/ucl_hash.c:229:1 Step #5: #1 0x5573a27740d7 in ucl_hash_search /src/libucl/src/ucl_hash.c:464:7 Step #5: #2 0x5573a275e28e in ucl_hash_search_obj /src/libucl/src/./ucl_internal.h:464:31 Step #5: #3 0x5573a275e28e in ucl_parser_process_object_element /src/libucl/src/ucl_parser.c:1249:10 Step #5: #4 0x5573a27609b3 in ucl_parse_key /src/libucl/src/ucl_parser.c:1561:7 Step #5: #5 0x5573a27609b3 in ucl_state_machine /src/libucl/src/ucl_parser.c:2525:9 Step #5: #6 0x5573a275fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #7 0x5573a276f71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #8 0x5573a276ef10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #9 0x5573a2768faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #10 0x5573a2762241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #11 0x5573a275fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #12 0x5573a276f71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #13 0x5573a276ef10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #14 0x5573a2768faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #15 0x5573a2762241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #16 0x5573a275fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #17 0x5573a276f71b in ucl_include_file_single /src/libucl/src/ucl_util.c:1366:8 Step #5: #18 0x5573a276ef10 in ucl_include_file /src/libucl/src/ucl_util.c:1476:10 Step #5: #19 0x5573a2768faf in ucl_include_common /src/libucl/src/ucl_util.c:1617:11 Step #5: #20 0x5573a2762241 in ucl_state_machine /src/libucl/src/ucl_parser.c:2677:12 Step #5: #21 0x5573a275fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #22 0x5573a276316b in ucl_parser_add_chunk /src/libucl/src/ucl_parser.c:3098:9 Step #5: #23 0x5573a276316b in ucl_parse_macro_arguments /src/libucl/src/ucl_parser.c:2378:9 Step #5: #24 0x5573a276316b in ucl_state_machine /src/libucl/src/ucl_parser.c:2650:18 Step #5: #25 0x5573a275fb50 in ucl_parser_add_chunk_full /src/libucl/src/ucl_parser.c:3051:12 Step #5: #26 0x5573a275d2c3 in LLVMFuzzerTestOneInput /src/libucl/tests/fuzzers/ucl_add_string_fuzzer.c:17:2 Step #5: #27 0x5573a26bf890 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #28 0x5573a26c8e60 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #29 0x5573a26b0415 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #30 0x5573a26db842 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #31 0x7fc79a242082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 0702430aef5fa3dda43986563e9ffcc47efbd75e) Step #5: #32 0x5573a26a2ced in _start (out/libfuzzer-coverage-x86_64/ucl_add_string_fuzzer+0x1fced) Step #5: Step #5: DEDUP_TOKEN: kh_get_ucl_hash_caseless_node--ucl_hash_search--ucl_hash_search_obj Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/libucl/src/ucl_hash.c:229:1 in kh_get_ucl_hash_caseless_node Step #5: ==162==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-e862facb02ab1228ea05c2d87825b7b97bb7dee6 Step #5: MERGE-OUTER: attempt 32 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4281289660 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/ucl_add_string_fuzzer/e862facb02ab1228ea05c2d87825b7b97bb7dee6' caused a failure at the previous merge step Step #5: MERGE-INNER: 6567 total files; 5099 processed earlier; will process 1468 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: malloc_consolidate(): invalid chunk size Step #5: ==166== ERROR: libFuzzer: deadly signal Step #5: ==166== libFuzzer: run interrupted; exiting Step #5: ==39== libFuzzer: run interrupted; exiting Step #5: du: cannot access '/workspace/out/libfuzzer-coverage-x86_64/dumps/ucl_add_string_fuzzer.*.profraw': No such file or directory Step #5: error: /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: No such file or directory Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image libucl Step #5: python infra/helper.py build_fuzzers --sanitizer coverage libucl Step #5: python infra/helper.py coverage libucl Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1