starting build "d3e9b4e6-8b68-4b65-a6d6-152be442a6c7"
FETCHSOURCE
BUILD
Starting Step #0
Step #0: Already have image (with digest): gcr.io/cloud-builders/git
Step #0: Cloning into 'oss-fuzz'...
Finished Step #0
Starting Step #1
Step #1: Already have image (with digest): gcr.io/cloud-builders/docker
Step #1: Sending build context to Docker daemon 26.11kB
Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder
Step #1: latest: Pulling from oss-fuzz-base/base-builder
Step #1: b549f31133a9: Pulling fs layer
Step #1: ee06c35af532: Pulling fs layer
Step #1: c36614e90b60: Pulling fs layer
Step #1: f7916c9a38bf: Pulling fs layer
Step #1: 45aba247b141: Pulling fs layer
Step #1: 3373c7ec2037: Pulling fs layer
Step #1: 75f33f8f2070: Pulling fs layer
Step #1: 7ca928a6e048: Pulling fs layer
Step #1: d63773318bc1: Pulling fs layer
Step #1: d48cd156a215: Pulling fs layer
Step #1: f825c78807d7: Pulling fs layer
Step #1: 23baad8ed203: Pulling fs layer
Step #1: 44ab4bfa873a: Pulling fs layer
Step #1: 9627a9a2b1ad: Pulling fs layer
Step #1: 58babef70f1b: Pulling fs layer
Step #1: 76cfe82852de: Pulling fs layer
Step #1: ae84697013da: Pulling fs layer
Step #1: b720c9261036: Pulling fs layer
Step #1: 2e43624579d5: Pulling fs layer
Step #1: eb77aa496973: Pulling fs layer
Step #1: 82414ded40c6: Pulling fs layer
Step #1: c58796fec269: Pulling fs layer
Step #1: 413d06e26590: Pulling fs layer
Step #1: 7bd5e0879902: Pulling fs layer
Step #1: 1e47901c4623: Pulling fs layer
Step #1: 78311f612a03: Pulling fs layer
Step #1: 09b5d9ecfd69: Pulling fs layer
Step #1: 79b30ddeffc0: Pulling fs layer
Step #1: 3271cdcf1f7c: Pulling fs layer
Step #1: 66a39d43e4df: Pulling fs layer
Step #1: f7916c9a38bf: Waiting
Step #1: 45aba247b141: Waiting
Step #1: 3373c7ec2037: Waiting
Step #1: 75f33f8f2070: Waiting
Step #1: 7ca928a6e048: Waiting
Step #1: 82414ded40c6: Waiting
Step #1: d63773318bc1: Waiting
Step #1: d48cd156a215: Waiting
Step #1: c58796fec269: Waiting
Step #1: 413d06e26590: Waiting
Step #1: 7bd5e0879902: Waiting
Step #1: 1e47901c4623: Waiting
Step #1: 78311f612a03: Waiting
Step #1: 09b5d9ecfd69: Waiting
Step #1: 79b30ddeffc0: Waiting
Step #1: 3271cdcf1f7c: Waiting
Step #1: 66a39d43e4df: Waiting
Step #1: f825c78807d7: Waiting
Step #1: ae84697013da: Waiting
Step #1: 23baad8ed203: Waiting
Step #1: b720c9261036: Waiting
Step #1: 2e43624579d5: Waiting
Step #1: eb77aa496973: Waiting
Step #1: 44ab4bfa873a: Waiting
Step #1: 9627a9a2b1ad: Waiting
Step #1: 76cfe82852de: Waiting
Step #1: c36614e90b60: Verifying Checksum
Step #1: c36614e90b60: Download complete
Step #1: f7916c9a38bf: Verifying Checksum
Step #1: f7916c9a38bf: Download complete
Step #1: 45aba247b141: Verifying Checksum
Step #1: 45aba247b141: Download complete
Step #1: 3373c7ec2037: Verifying Checksum
Step #1: 3373c7ec2037: Download complete
Step #1: 75f33f8f2070: Verifying Checksum
Step #1: 75f33f8f2070: Download complete
Step #1: 7ca928a6e048: Verifying Checksum
Step #1: d63773318bc1: Verifying Checksum
Step #1: d63773318bc1: Download complete
Step #1: d48cd156a215: Verifying Checksum
Step #1: d48cd156a215: Download complete
Step #1: f825c78807d7: Verifying Checksum
Step #1: f825c78807d7: Download complete
Step #1: 23baad8ed203: Verifying Checksum
Step #1: 23baad8ed203: Download complete
Step #1: 44ab4bfa873a: Verifying Checksum
Step #1: 44ab4bfa873a: Download complete
Step #1: 9627a9a2b1ad: Verifying Checksum
Step #1: 9627a9a2b1ad: Download complete
Step #1: 58babef70f1b: Download complete
Step #1: 76cfe82852de: Verifying Checksum
Step #1: 76cfe82852de: Download complete
Step #1: ae84697013da: Verifying Checksum
Step #1: ae84697013da: Download complete
Step #1: b720c9261036: Verifying Checksum
Step #1: b720c9261036: Download complete
Step #1: 2e43624579d5: Verifying Checksum
Step #1: 2e43624579d5: Download complete
Step #1: eb77aa496973: Verifying Checksum
Step #1: eb77aa496973: Download complete
Step #1: 82414ded40c6: Verifying Checksum
Step #1: 82414ded40c6: Download complete
Step #1: c58796fec269: Verifying Checksum
Step #1: c58796fec269: Download complete
Step #1: 413d06e26590: Verifying Checksum
Step #1: 413d06e26590: Download complete
Step #1: 7bd5e0879902: Verifying Checksum
Step #1: 7bd5e0879902: Download complete
Step #1: 1e47901c4623: Verifying Checksum
Step #1: 1e47901c4623: Download complete
Step #1: 78311f612a03: Verifying Checksum
Step #1: 78311f612a03: Download complete
Step #1: 09b5d9ecfd69: Verifying Checksum
Step #1: 09b5d9ecfd69: Download complete
Step #1: 79b30ddeffc0: Verifying Checksum
Step #1: 79b30ddeffc0: Download complete
Step #1: 3271cdcf1f7c: Verifying Checksum
Step #1: 3271cdcf1f7c: Download complete
Step #1: 66a39d43e4df: Verifying Checksum
Step #1: 66a39d43e4df: Download complete
Step #1: b549f31133a9: Verifying Checksum
Step #1: b549f31133a9: Download complete
Step #1: b549f31133a9: Pull complete
Step #1: ee06c35af532: Download complete
Step #1: ee06c35af532: Pull complete
Step #1: c36614e90b60: Pull complete
Step #1: f7916c9a38bf: Pull complete
Step #1: 45aba247b141: Pull complete
Step #1: 3373c7ec2037: Pull complete
Step #1: 75f33f8f2070: Pull complete
Step #1: 7ca928a6e048: Pull complete
Step #1: d63773318bc1: Pull complete
Step #1: d48cd156a215: Pull complete
Step #1: f825c78807d7: Pull complete
Step #1: 23baad8ed203: Pull complete
Step #1: 44ab4bfa873a: Pull complete
Step #1: 9627a9a2b1ad: Pull complete
Step #1: 58babef70f1b: Pull complete
Step #1: 76cfe82852de: Pull complete
Step #1: ae84697013da: Pull complete
Step #1: b720c9261036: Pull complete
Step #1: 2e43624579d5: Pull complete
Step #1: eb77aa496973: Pull complete
Step #1: 82414ded40c6: Pull complete
Step #1: c58796fec269: Pull complete
Step #1: 413d06e26590: Pull complete
Step #1: 7bd5e0879902: Pull complete
Step #1: 1e47901c4623: Pull complete
Step #1: 78311f612a03: Pull complete
Step #1: 09b5d9ecfd69: Pull complete
Step #1: 79b30ddeffc0: Pull complete
Step #1: 3271cdcf1f7c: Pull complete
Step #1: 66a39d43e4df: Pull complete
Step #1: Digest: sha256:d138a2357c04b5f9224cb9fddbd0d7c93493af3ff70861cece769de5878993e5
Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest
Step #1: ---> ac9fe2ae38ad
Step #1: Step 2/6 : RUN apt-get update && apt-get install -y --no-install-recommends cmake ninja-build && apt-get clean
Step #1: ---> Running in 63444bf4b014
Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease
Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB]
Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease
Step #1: Fetched 114 kB in 1s (124 kB/s)
Step #1: Reading package lists...
Step #1: Reading package lists...
Step #1: Building dependency tree...
Step #1: Reading state information...
Step #1: The following additional packages will be installed:
Step #1: cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2
Step #1: Suggested packages:
Step #1: cmake-doc lrzip python3
Step #1: The following NEW packages will be installed:
Step #1: cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2
Step #1: ninja-build
Step #1: 0 upgraded, 9 newly installed, 0 to remove and 0 not upgraded.
Step #1: Need to get 15.1 MB of archives.
Step #1: After this operation, 65.3 MB of additional disk space will be used.
Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB]
Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [640 kB]
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.3 [80.8 kB]
Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB]
Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.2 [327 kB]
Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB]
Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB]
Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB]
Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/universe amd64 ninja-build amd64 1.10.0-1build1 [107 kB]
Step #1: [91mdebconf: delaying package configuration, since apt-utils is not installed
Step #1: [0mFetched 15.1 MB in 2s (8984 kB/s)
Step #1: Selecting previously unselected package libicu66:amd64.
Step #1: (Reading database ...
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 17382 files and directories currently installed.)
Step #1: Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ...
Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ...
Step #1: Selecting previously unselected package libxml2:amd64.
Step #1: Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ...
Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ...
Step #1: Selecting previously unselected package libuv1:amd64.
Step #1: Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.3_amd64.deb ...
Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.3) ...
Step #1: Selecting previously unselected package cmake-data.
Step #1: Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ...
Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Selecting previously unselected package libarchive13:amd64.
Step #1: Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.2_amd64.deb ...
Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.2) ...
Step #1: Selecting previously unselected package libjsoncpp1:amd64.
Step #1: Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ...
Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ...
Step #1: Selecting previously unselected package librhash0:amd64.
Step #1: Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ...
Step #1: Unpacking librhash0:amd64 (1.3.9-1) ...
Step #1: Selecting previously unselected package cmake.
Step #1: Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ...
Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Selecting previously unselected package ninja-build.
Step #1: Preparing to unpack .../8-ninja-build_1.10.0-1build1_amd64.deb ...
Step #1: Unpacking ninja-build (1.10.0-1build1) ...
Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ...
Step #1: Setting up ninja-build (1.10.0-1build1) ...
Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.3) ...
Step #1: Setting up librhash0:amd64 (1.3.9-1) ...
Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ...
Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ...
Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.2) ...
Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.12) ...
Step #1: Removing intermediate container 63444bf4b014
Step #1: ---> 99e8e146a0a2
Step #1: Step 3/6 : RUN git clone -b next --single-branch https://github.com/htacg/tidy-html5.git tidy-html5
Step #1: ---> Running in 1bbe63150766
Step #1: [91mCloning into 'tidy-html5'...
Step #1: [0mRemoving intermediate container 1bbe63150766
Step #1: ---> bf3c00898af2
Step #1: Step 4/6 : WORKDIR tidy-html5
Step #1: ---> Running in 68cc952c056a
Step #1: Removing intermediate container 68cc952c056a
Step #1: ---> c27755c0b362
Step #1: Step 5/6 : COPY build.sh $SRC/
Step #1: ---> 69b5753772b8
Step #1: Step 6/6 : COPY *.c *.h *.options $SRC/
Step #1: ---> fa3d6b63590b
Step #1: Successfully built fa3d6b63590b
Step #1: Successfully tagged gcr.io/oss-fuzz/tidy-html5:latest
Finished Step #1
Starting Step #2 - "srcmap"
Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/tidy-html5
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + SRCMAP=/tmp/fileeJKbrN
Step #2 - "srcmap": + echo '{}'
Step #2 - "srcmap": + PATHS_TO_SCAN=/src
Step #2 - "srcmap": + [[ c++ == \g\o ]]
Step #2 - "srcmap": ++ find /src -name .git -type d
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/tidy-html5/.git
Step #2 - "srcmap": + GIT_DIR=/src/tidy-html5
Step #2 - "srcmap": + cd /src/tidy-html5
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/htacg/tidy-html5.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=d08ddc2860aa95ba8e301343a30837f157977cba
Step #2 - "srcmap": + jq_inplace /tmp/fileeJKbrN '."/src/tidy-html5" = { type: "git", url: "https://github.com/htacg/tidy-html5.git", rev: "d08ddc2860aa95ba8e301343a30837f157977cba" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/filexAEVEb
Step #2 - "srcmap": + cat /tmp/fileeJKbrN
Step #2 - "srcmap": + jq '."/src/tidy-html5" = { type: "git", url: "https://github.com/htacg/tidy-html5.git", rev: "d08ddc2860aa95ba8e301343a30837f157977cba" }'
Step #2 - "srcmap": + mv /tmp/filexAEVEb /tmp/fileeJKbrN
Step #2 - "srcmap": ++ find /src -name .svn -type d
Step #2 - "srcmap": ++ find /src -name .hg -type d
Step #2 - "srcmap": + '[' '' '!=' '' ']'
Step #2 - "srcmap": + cat /tmp/fileeJKbrN
Step #2 - "srcmap": + rm /tmp/fileeJKbrN
Step #2 - "srcmap": {
Step #2 - "srcmap": "/src/tidy-html5": {
Step #2 - "srcmap": "type": "git",
Step #2 - "srcmap": "url": "https://github.com/htacg/tidy-html5.git",
Step #2 - "srcmap": "rev": "d08ddc2860aa95ba8e301343a30837f157977cba"
Step #2 - "srcmap": }
Step #2 - "srcmap": }
Finished Step #2 - "srcmap"
Starting Step #3 - "compile-libfuzzer-coverage-x86_64"
Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done.
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang
Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++
Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument
Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++
Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir -p /work/tidy-html5
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /work/tidy-html5
Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake -GNinja /src/tidy-html5/
Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 15.0.0
Step #3 - "compile-libfuzzer-coverage-x86_64": -- The CXX compiler identification is Clang 15.0.0
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info - done
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features - done
Step #3 - "compile-libfuzzer-coverage-x86_64": [0m-> TIDY_SO_VERSION = 59. This is an ODD (development) release.[0m
Step #3 - "compile-libfuzzer-coverage-x86_64": -- *** Debug Logging is NOT enabled.
Step #3 - "compile-libfuzzer-coverage-x86_64": -- *** Building support for runtime configuration files.
Step #3 - "compile-libfuzzer-coverage-x86_64": -- *** Also building DLL library SHARED, version 5.9.20, date 2022.01.25
Step #3 - "compile-libfuzzer-coverage-x86_64": -- *** NOTE: xsltproc NOT FOUND! Can NOT generate man page.
Step #3 - "compile-libfuzzer-coverage-x86_64": -- *** You need to install xsltproc in your system.
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done
Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /work/tidy-html5
Step #3 - "compile-libfuzzer-coverage-x86_64": + ninja
Step #3 - "compile-libfuzzer-coverage-x86_64":
[0/56] Building C object CMakeFiles/tidy-static.dir/src/access.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/attrs.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/istack.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/parser.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/tags.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/entities.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/lexer.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/pprint.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/charsets.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/clean.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/message.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/config.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/alloc.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/attrdict.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/buffio.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/fileio.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/streamio.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/tagask.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/tmbstr.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/utf8.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/tidylib.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/mappedio.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/gdoc.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/language.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/messageobj.c.o[K
[0/56] Building C object CMakeFiles/tidy-static.dir/src/sprtf.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/access.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/attrs.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/istack.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/parser.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/tags.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/entities.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/lexer.c.o[K
[0/56] Building C object CMakeFiles/tidy-share.dir/src/pprint.c.o[K
[1/56] Building C object CMakeFiles/tidy-static.dir/src/sprtf.c.o[K
[1/56] Building C object CMakeFiles/tidy-share.dir/src/charsets.c.o[K
[2/56] Building C object CMakeFiles/tidy-static.dir/src/alloc.c.o[K
[2/56] Building C object CMakeFiles/tidy-share.dir/src/clean.c.o[K
[3/56] Building C object CMakeFiles/tidy-static.dir/src/fileio.c.o[K
[3/56] Building C object CMakeFiles/tidy-share.dir/src/message.c.o[K
[4/56] Building C object CMakeFiles/tidy-static.dir/src/tagask.c.o[K
[4/56] Building C object CMakeFiles/tidy-share.dir/src/config.c.o[K
[5/56] Building C object CMakeFiles/tidy-static.dir/src/mappedio.c.o[K
[5/56] Building C object CMakeFiles/tidy-share.dir/src/alloc.c.o[K
[6/56] Building C object CMakeFiles/tidy-static.dir/src/gdoc.c.o[K
[6/56] Building C object CMakeFiles/tidy-share.dir/src/attrdict.c.o[K
[7/56] Building C object CMakeFiles/tidy-static.dir/src/charsets.c.o[K
[7/56] Building C object CMakeFiles/tidy-share.dir/src/buffio.c.o[K
[8/56] Building C object CMakeFiles/tidy-static.dir/src/buffio.c.o[K
[8/56] Building C object CMakeFiles/tidy-share.dir/src/fileio.c.o[K
[9/56] Building C object CMakeFiles/tidy-static.dir/src/utf8.c.o[K
[9/56] Building C object CMakeFiles/tidy-share.dir/src/streamio.c.o[K
[10/56] Building C object CMakeFiles/tidy-share.dir/src/istack.c.o[K
[10/56] Building C object CMakeFiles/tidy-share.dir/src/tagask.c.o[K
[11/56] Building C object CMakeFiles/tidy-share.dir/src/alloc.c.o[K
[11/56] Building C object CMakeFiles/tidy-share.dir/src/tmbstr.c.o[K
[12/56] Building C object CMakeFiles/tidy-static.dir/src/istack.c.o[K
[12/56] Building C object CMakeFiles/tidy-share.dir/src/utf8.c.o[K
[13/56] Building C object CMakeFiles/tidy-static.dir/src/entities.c.o[K
[13/56] Building C object CMakeFiles/tidy-share.dir/src/tidylib.c.o[K
[14/56] Building C object CMakeFiles/tidy-static.dir/src/tmbstr.c.o[K
[14/56] Building C object CMakeFiles/tidy-share.dir/src/mappedio.c.o[K
[15/56] Building C object CMakeFiles/tidy-share.dir/src/entities.c.o[K
[15/56] Building C object CMakeFiles/tidy-share.dir/src/gdoc.c.o[K
[16/56] Building C object CMakeFiles/tidy-share.dir/src/charsets.c.o[K
[16/56] Building C object CMakeFiles/tidy-share.dir/src/language.c.o[K
[17/56] Building C object CMakeFiles/tidy-share.dir/src/fileio.c.o[K
[17/56] Building C object CMakeFiles/tidy-share.dir/src/messageobj.c.o[K
[18/56] Building C object CMakeFiles/tidy-share.dir/src/buffio.c.o[K
[18/56] Building C object CMakeFiles/tidy-share.dir/src/sprtf.c.o[K
[19/56] Building C object CMakeFiles/tidy-share.dir/src/tagask.c.o[K
[19/56] Building C object CMakeFiles/tidy.dir/console/tidy.c.o[K
[20/56] Building C object CMakeFiles/tidy-static.dir/src/messageobj.c.o[K
[21/56] Building C object CMakeFiles/tidy-share.dir/src/sprtf.c.o[K
[22/56] Building C object CMakeFiles/tidy-static.dir/src/language.c.o[K
[23/56] Building C object CMakeFiles/tidy-share.dir/src/gdoc.c.o[K
[24/56] Building C object CMakeFiles/tidy-share.dir/src/mappedio.c.o[K
[25/56] Building C object CMakeFiles/tidy-share.dir/src/tmbstr.c.o[K
[26/56] Building C object CMakeFiles/tidy-share.dir/src/utf8.c.o[K
[27/56] Building C object CMakeFiles/tidy-static.dir/src/streamio.c.o[K
[28/56] Building C object CMakeFiles/tidy-static.dir/src/message.c.o[K
[29/56] Building C object CMakeFiles/tidy-static.dir/src/tags.c.o[K
[30/56] Building C object CMakeFiles/tidy-share.dir/src/tags.c.o[K
[31/56] Building C object CMakeFiles/tidy-share.dir/src/messageobj.c.o[K
[32/56] Building C object CMakeFiles/tidy-share.dir/src/streamio.c.o[K
[33/56] Building C object CMakeFiles/tidy-share.dir/src/language.c.o[K
[34/56] Building C object CMakeFiles/tidy-share.dir/src/message.c.o[K
[35/56] Building C object CMakeFiles/tidy-static.dir/src/config.c.o[K
[36/56] Building C object CMakeFiles/tidy-static.dir/src/attrdict.c.o[K
[37/56] Building C object CMakeFiles/tidy-static.dir/src/tidylib.c.o[K
[38/56] Building C object CMakeFiles/tidy-share.dir/src/attrdict.c.o[K
[39/56] Building C object CMakeFiles/tidy.dir/console/tidy.c.o[K
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tidy-html5/console/tidy.c:2085:10: warning: variable 'accessWarnings' set but not used [-Wunused-but-set-variable]
Step #3 - "compile-libfuzzer-coverage-x86_64": uint accessWarnings = 0;
Step #3 - "compile-libfuzzer-coverage-x86_64": ^
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated.
Step #3 - "compile-libfuzzer-coverage-x86_64":
[40/56] Building C object CMakeFiles/tidy-share.dir/src/config.c.o[K
[41/56] Building C object CMakeFiles/tidy-share.dir/src/pprint.c.o[K
[42/56] Building C object CMakeFiles/tidy-static.dir/src/clean.c.o[K
[43/56] Building C object CMakeFiles/tidy-share.dir/src/tidylib.c.o[K
[44/56] Building C object CMakeFiles/tidy-static.dir/src/pprint.c.o[K
[45/56] Building C object CMakeFiles/tidy-static.dir/src/attrs.c.o[K
[46/56] Building C object CMakeFiles/tidy-share.dir/src/clean.c.o[K
[47/56] Building C object CMakeFiles/tidy-share.dir/src/attrs.c.o[K
[48/56] Building C object CMakeFiles/tidy-share.dir/src/access.c.o[K
[49/56] Building C object CMakeFiles/tidy-static.dir/src/access.c.o[K
[50/56] Building C object CMakeFiles/tidy-share.dir/src/lexer.c.o[K
[51/56] Building C object CMakeFiles/tidy-static.dir/src/lexer.c.o[K
[52/56] Building C object CMakeFiles/tidy-static.dir/src/parser.c.o[K
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tidy-html5/src/parser.c:2793:11: warning: variable 'head' set but not used [-Wunused-but-set-variable]
Step #3 - "compile-libfuzzer-coverage-x86_64": Node *head = NULL;
Step #3 - "compile-libfuzzer-coverage-x86_64": ^
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated.
Step #3 - "compile-libfuzzer-coverage-x86_64":
[52/56] Linking C static library libtidy.a[K
[53/56] Linking C static library libtidy.a[K
[53/56] Linking C executable tidy[K
[54/56] Building C object CMakeFiles/tidy-share.dir/src/parser.c.o[K
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tidy-html5/src/parser.c:2793:11: warning: variable 'head' set but not used [-Wunused-but-set-variable]
Step #3 - "compile-libfuzzer-coverage-x86_64": Node *head = NULL;
Step #3 - "compile-libfuzzer-coverage-x86_64": ^
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated.
Step #3 - "compile-libfuzzer-coverage-x86_64":
[54/56] Linking C shared library libtidy.so[K
[55/56] Linking C executable tidy[K
[56/56] Linking C shared library libtidy.so[K
Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in tidy_config_fuzzer tidy_fuzzer tidy_xml_fuzzer tidy_parse_string_fuzzer tidy_parse_file_fuzzer tidy_general_fuzzer
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c -I/src/tidy-html5/include /src/tidy_config_fuzzer.c -o tidy_config_fuzzer.o
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 tidy_config_fuzzer.o -o /workspace/out/libfuzzer-coverage-x86_64/tidy_config_fuzzer -fsanitize=fuzzer libtidy.a
Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in tidy_config_fuzzer tidy_fuzzer tidy_xml_fuzzer tidy_parse_string_fuzzer tidy_parse_file_fuzzer tidy_general_fuzzer
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c -I/src/tidy-html5/include /src/tidy_fuzzer.c -o tidy_fuzzer.o
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 tidy_fuzzer.o -o /workspace/out/libfuzzer-coverage-x86_64/tidy_fuzzer -fsanitize=fuzzer libtidy.a
Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in tidy_config_fuzzer tidy_fuzzer tidy_xml_fuzzer tidy_parse_string_fuzzer tidy_parse_file_fuzzer tidy_general_fuzzer
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c -I/src/tidy-html5/include /src/tidy_xml_fuzzer.c -o tidy_xml_fuzzer.o
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 tidy_xml_fuzzer.o -o /workspace/out/libfuzzer-coverage-x86_64/tidy_xml_fuzzer -fsanitize=fuzzer libtidy.a
Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in tidy_config_fuzzer tidy_fuzzer tidy_xml_fuzzer tidy_parse_string_fuzzer tidy_parse_file_fuzzer tidy_general_fuzzer
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c -I/src/tidy-html5/include /src/tidy_parse_string_fuzzer.c -o tidy_parse_string_fuzzer.o
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 tidy_parse_string_fuzzer.o -o /workspace/out/libfuzzer-coverage-x86_64/tidy_parse_string_fuzzer -fsanitize=fuzzer libtidy.a
Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in tidy_config_fuzzer tidy_fuzzer tidy_xml_fuzzer tidy_parse_string_fuzzer tidy_parse_file_fuzzer tidy_general_fuzzer
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c -I/src/tidy-html5/include /src/tidy_parse_file_fuzzer.c -o tidy_parse_file_fuzzer.o
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 tidy_parse_file_fuzzer.o -o /workspace/out/libfuzzer-coverage-x86_64/tidy_parse_file_fuzzer -fsanitize=fuzzer libtidy.a
Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in tidy_config_fuzzer tidy_fuzzer tidy_xml_fuzzer tidy_parse_string_fuzzer tidy_parse_file_fuzzer tidy_general_fuzzer
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c -I/src/tidy-html5/include /src/tidy_general_fuzzer.c -o tidy_general_fuzzer.o
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++11 tidy_general_fuzzer.o -o /workspace/out/libfuzzer-coverage-x86_64/tidy_general_fuzzer -fsanitize=fuzzer libtidy.a
Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/tidy_config_fuzzer.options /workspace/out/libfuzzer-coverage-x86_64/
Finished Step #3 - "compile-libfuzzer-coverage-x86_64"
Starting Step #4
Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner
Step #4: Using default tag: latest
Step #4: latest: Pulling from oss-fuzz-base/base-runner
Step #4: b549f31133a9: Already exists
Step #4: ee06c35af532: Already exists
Step #4: c36614e90b60: Already exists
Step #4: 98ec86b48d6a: Pulling fs layer
Step #4: 0ac5e2f60d1e: Pulling fs layer
Step #4: c4558f40ae30: Pulling fs layer
Step #4: 99fb824f3a73: Pulling fs layer
Step #4: 1520db3c4ef9: Pulling fs layer
Step #4: 38f47f48f934: Pulling fs layer
Step #4: 2ec5d19345f4: Pulling fs layer
Step #4: 4dff2b6ddec6: Pulling fs layer
Step #4: 039388f18868: Pulling fs layer
Step #4: 90a817c44129: Pulling fs layer
Step #4: b0f8ddb39088: Pulling fs layer
Step #4: a2f57b840987: Pulling fs layer
Step #4: 80e4f52ec1f6: Pulling fs layer
Step #4: 07ffc57df921: Pulling fs layer
Step #4: 90a817c44129: Waiting
Step #4: b0f8ddb39088: Waiting
Step #4: 039388f18868: Waiting
Step #4: a2f57b840987: Waiting
Step #4: 80e4f52ec1f6: Waiting
Step #4: 07ffc57df921: Waiting
Step #4: 99fb824f3a73: Waiting
Step #4: 2ec5d19345f4: Waiting
Step #4: 4dff2b6ddec6: Waiting
Step #4: 1520db3c4ef9: Waiting
Step #4: 38f47f48f934: Waiting
Step #4: c4558f40ae30: Verifying Checksum
Step #4: c4558f40ae30: Download complete
Step #4: 98ec86b48d6a: Verifying Checksum
Step #4: 0ac5e2f60d1e: Verifying Checksum
Step #4: 0ac5e2f60d1e: Download complete
Step #4: 1520db3c4ef9: Verifying Checksum
Step #4: 1520db3c4ef9: Download complete
Step #4: 38f47f48f934: Download complete
Step #4: 98ec86b48d6a: Pull complete
Step #4: 2ec5d19345f4: Verifying Checksum
Step #4: 2ec5d19345f4: Download complete
Step #4: 039388f18868: Verifying Checksum
Step #4: 039388f18868: Download complete
Step #4: 4dff2b6ddec6: Verifying Checksum
Step #4: 4dff2b6ddec6: Download complete
Step #4: 0ac5e2f60d1e: Pull complete
Step #4: c4558f40ae30: Pull complete
Step #4: b0f8ddb39088: Verifying Checksum
Step #4: b0f8ddb39088: Download complete
Step #4: a2f57b840987: Verifying Checksum
Step #4: a2f57b840987: Download complete
Step #4: 90a817c44129: Verifying Checksum
Step #4: 90a817c44129: Download complete
Step #4: 07ffc57df921: Verifying Checksum
Step #4: 07ffc57df921: Download complete
Step #4: 80e4f52ec1f6: Verifying Checksum
Step #4: 80e4f52ec1f6: Download complete
Step #4: 99fb824f3a73: Verifying Checksum
Step #4: 99fb824f3a73: Download complete
Step #4: 99fb824f3a73: Pull complete
Step #4: 1520db3c4ef9: Pull complete
Step #4: 38f47f48f934: Pull complete
Step #4: 2ec5d19345f4: Pull complete
Step #4: 4dff2b6ddec6: Pull complete
Step #4: 039388f18868: Pull complete
Step #4: 90a817c44129: Pull complete
Step #4: b0f8ddb39088: Pull complete
Step #4: a2f57b840987: Pull complete
Step #4: 80e4f52ec1f6: Pull complete
Step #4: 07ffc57df921: Pull complete
Step #4: Digest: sha256:a830664167ebe97d061360b8c97eeab6f26e4802b39d82e7b8171df38eb92729
Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest
Step #4: gcr.io/oss-fuzz-base/base-runner:latest
Finished Step #4
Starting Step #5
Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Step #5: Running tidy_xml_fuzzer
Step #5: Running tidy_fuzzer
Step #5: Running tidy_general_fuzzer
Step #5: Running tidy_config_fuzzer
Step #5: Running tidy_parse_string_fuzzer
Step #5: Running tidy_parse_file_fuzzer
Step #5: [2023-11-20 07:17:52,144 INFO] Finding shared libraries for targets (if any).
Step #5: [2023-11-20 07:17:52,153 INFO] Finished finding shared libraries for targets.
Step #5: Error occured while running tidy_fuzzer:
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1072481450
Step #5: MERGE-OUTER: 16649 files, 0 in the initial corpus, 0 processed earlier
Step #5: MERGE-OUTER: attempt 1
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1072529178
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: 16649 total files; 0 processed earlier; will process 16649 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: #64 pulse exec/s: 0 rss: 32Mb
Step #5: #128 pulse exec/s: 0 rss: 32Mb
Step #5: #256 pulse exec/s: 0 rss: 33Mb
Step #5: #512 pulse exec/s: 0 rss: 33Mb
Step #5: #1024 pulse exec/s: 0 rss: 33Mb
Step #5: ==103== ERROR: libFuzzer: out-of-memory (used: 2090Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x70,0x52,0x45,0x24,0x3c,0x51,0x3c,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,
Step #5:
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x51,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65,
Step #5: \012
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x78,0x6d,0x70,0x3e,0x42,0x3e,0x3c,0x42,0x3e,0x3c,0x2f,0x3c,0x53,0x3c,0x53,0x3e,0x3c,0x3e,0x3c,0x42,0x3e,0x3e,
Step #5: =
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x50,0x52,0x65,0xb8,0x3c,0x71,0x3e,
Step #5:
Step #5: artifact_prefix='./'; Test unit written to ./oom-0c659140ecfa088807f883dc72789cca7d0431c9
Step #5: Base64: PFBSZbg8cT4=
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 3
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1139662710
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/0c659140ecfa088807f883dc72789cca7d0431c9' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 1412 processed earlier; will process 15237 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: #64 pulse exec/s: 0 rss: 32Mb
Step #5: #128 pulse exec/s: 0 rss: 32Mb
Step #5: #256 pulse exec/s: 0 rss: 33Mb
Step #5: ==139== ERROR: libFuzzer: out-of-memory (used: 2078Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
e
Step #5: artifact_prefix='./'; Test unit written to ./oom-023346d72bf38dc9b47e99391fe591be17815686
Step #5: Base64: PFBSZbg8cT5l
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 4
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1172733862
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/023346d72bf38dc9b47e99391fe591be17815686' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 1883 processed earlier; will process 14766 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: #64 pulse exec/s: 0 rss: 32Mb
Step #5: #128 pulse exec/s: 0 rss: 32Mb
Step #5: #256 pulse exec/s: 0 rss: 33Mb
Step #5: #512 pulse exec/s: 0 rss: 33Mb
Step #5: ==151== ERROR: libFuzzer: out-of-memory (used: 2093Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5: artifact_prefix='./'; Test unit written to ./oom-3ad48fdc90f6d2537cbcb140025b55c1e089a100
Step #5: Base64: PFBSZbg8cT48cT4=
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 5
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1205808125
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/3ad48fdc90f6d2537cbcb140025b55c1e089a100' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 2491 processed earlier; will process 14158 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: #64 pulse exec/s: 0 rss: 32Mb
Step #5: #128 pulse exec/s: 0 rss: 32Mb
Step #5: ==166== ERROR: libFuzzer: out-of-memory (used: 2050Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
e
Step #5: artifact_prefix='./'; Test unit written to ./oom-32da034f6a73e2c50dcdaf713157e6ab76ae70f0
Step #5: Base64: PFBSZbg8cT48cT5l
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 6
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1237885211
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/32da034f6a73e2c50dcdaf713157e6ab76ae70f0' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 2625 processed earlier; will process 14024 files now
Step #5: #1 pulse exec/s: 0 rss: 33Mb
Step #5: #2 pulse exec/s: 0 rss: 33Mb
Step #5: #4 pulse exec/s: 0 rss: 33Mb
Step #5: #8 pulse exec/s: 0 rss: 33Mb
Step #5: #16 pulse exec/s: 0 rss: 33Mb
Step #5: #32 pulse exec/s: 0 rss: 33Mb
Step #5: #64 pulse exec/s: 0 rss: 33Mb
Step #5: ==243== ERROR: libFuzzer: out-of-memory (used: 2075Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
p
Step #5: artifact_prefix='./'; Test unit written to ./oom-40ed3f08b882898692d8d9db0bb6ac90462f0002
Step #5: Base64: PHBSRSQ8UTw8cD5w
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 7
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1270962224
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/40ed3f08b882898692d8d9db0bb6ac90462f0002' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 2690 processed earlier; will process 13959 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: #64 pulse exec/s: 0 rss: 32Mb
Step #5: #128 pulse exec/s: 0 rss: 32Mb
Step #5: ==255== ERROR: libFuzzer: out-of-memory (used: 2095Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x50,0x72,0x65,0x3c,0x49,0x7c,0x3c,0x49,0x7d,0x3c,0x44,0x4c,
Step #5:
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x50,0x52,0x65,0xb8,0x55,0x3c,0x71,0x3e,0x3e,0x3c,0x71,0xbe,0x3e,0x32,
Step #5:
>
2
Step #5: artifact_prefix='./'; Test unit written to ./oom-79376ce02b210894a72603e10cddce1fa9687a5c
Step #5: Base64: PFBSZbhVPHE+Pjxxvj4y
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 10
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1369210693
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/79376ce02b210894a72603e10cddce1fa9687a5c' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 3512 processed earlier; will process 13137 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: #64 pulse exec/s: 0 rss: 32Mb
Step #5: #128 pulse exec/s: 0 rss: 32Mb
Step #5: ==288== ERROR: libFuzzer: out-of-memory (used: 2304Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x70,0x52,0x45,0x24,0x3c,0x51,0x3c,0x3c,0x70,0x3e,0x1c,0x70,0x3e,0x3c,0x70,
Step #5:
\034p>
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x62,0x65,0x3c,0x70,0x52,0x45,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69,0x3e,0xa,0x3e,0xa,0x3c,
Step #5: be
\012\012>\012<
Step #5: artifact_prefix='./'; Test unit written to ./oom-4a151633219e8b1d5890393066436bc9ec1d0490
Step #5: Base64: YmU8cFJFCjxpPgo8aT4KPgo8
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 15
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1540615338
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/4a151633219e8b1d5890393066436bc9ec1d0490' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 4197 processed earlier; will process 12452 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: ==351== ERROR: libFuzzer: out-of-memory (used: 2319Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x78,0x6d,0x70,0x3e,0x3c,0x53,0x3c,0x53,0x3e,0x7c,0x2f,0x42,0x3e,0x3c,0x42,0x3e,0x3c,0x2f,0x53,0x3e,0x3e,
Step #5:
|/B>>
Step #5: artifact_prefix='./'; Test unit written to ./oom-0fb1333c0a13d4f1ec1424e73d78248a4ed5c452
Step #5: Base64: PHhtcD48UzxTPnwvQj48Qj48L1M+Pg==
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 17
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1613766522
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/0fb1333c0a13d4f1ec1424e73d78248a4ed5c452' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 5049 processed earlier; will process 11600 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: ==369== ERROR: libFuzzer: out-of-memory (used: 2066Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x70,0x52,0x45,0x24,0x3c,0x51,0x3c,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0xa,0x3c,0x70,0x3f,0x3c,0x70,
Step #5:
<>>
Step #5: artifact_prefix='./'; Test unit written to ./oom-cdab5b06c0100cf3ffe3e8d954de033b4178beba
Step #5: Base64: PHhtcD5CPjxCPjwvPFM8Uz48PjxCPj4=
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 20
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1720016368
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/cdab5b06c0100cf3ffe3e8d954de033b4178beba' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 5183 processed earlier; will process 11466 files now
Step #5: #1 pulse exec/s: 0 rss: 33Mb
Step #5: #2 pulse exec/s: 0 rss: 33Mb
Step #5: #4 pulse exec/s: 0 rss: 33Mb
Step #5: #8 pulse exec/s: 0 rss: 33Mb
Step #5: #16 pulse exec/s: 0 rss: 33Mb
Step #5: #32 pulse exec/s: 0 rss: 33Mb
Step #5: #64 pulse exec/s: 0 rss: 33Mb
Step #5: #128 pulse exec/s: 0 rss: 33Mb
Step #5: ==405== ERROR: libFuzzer: out-of-memory (used: 2090Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=e
Step #5: artifact_prefix='./'; Test unit written to ./oom-48d1c3477e000a1960fb445888cc1197197675ec
Step #5: Base64: PFBSZbg8cT48cT48cT48cT48cT48cT5l
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 21
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1753106368
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/48d1c3477e000a1960fb445888cc1197197675ec' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 5332 processed earlier; will process 11317 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: #64 pulse exec/s: 0 rss: 32Mb
Step #5: #128 pulse exec/s: 0 rss: 32Mb
Step #5: ==417== ERROR: libFuzzer: out-of-memory (used: 2063Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x78,0x6d,0x70,0x3e,0x3c,0x53,0x3c,0x53,0x3e,0x3e,0x3c,0x2f,0x53,0x3e,0x3c,0x53,0x3e,0x3e,0x3c,0x2f,0x53,0x3e,0x3c,0x42,0x3e,
Step #5:
>>
Step #5: artifact_prefix='./'; Test unit written to ./oom-b3d0bc47a1c0eb66a2064adb38f815db1fc85b53
Step #5: Base64: PHhtcD48UzxTPj48L1M+PFM+PjwvUz48Qj4=
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 23
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 1819272261
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/b3d0bc47a1c0eb66a2064adb38f815db1fc85b53' caused a failure at the previous merge step
Step #5: MERGE-INNER: 16649 total files; 5636 processed earlier; will process 11013 files now
Step #5: #1 pulse exec/s: 0 rss: 32Mb
Step #5: #2 pulse exec/s: 0 rss: 32Mb
Step #5: #4 pulse exec/s: 0 rss: 32Mb
Step #5: #8 pulse exec/s: 0 rss: 32Mb
Step #5: #16 pulse exec/s: 0 rss: 32Mb
Step #5: #32 pulse exec/s: 0 rss: 32Mb
Step #5: ==444== ERROR: libFuzzer: out-of-memory (used: 2084Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x51,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65, Step #5:Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x3e,0x3c,0x55,0xaf,0x49,0x53,0x6d,0x41,0x70,0x3d,0x47,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x1,0xf0,0x3e,0x3c,0x70,0x52,0x45,0x3c, Step #5:\001\360>
Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x55,0xcb,0x3c,0x70,0x52,0x65,0xbe,0x3c,0x3c,0x44,0x45,0x4c,0x3e,0x3c,0x68,0x31,0x3e,0x3e,0x3c,0x68,0x32,0x3e,0x3c,0x68,0x31,0x1a, Step #5:>
Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x78,0x6d,0x70,0x3e,0x42,0x3e,0x3c,0x42,0x3e,0x3c,0x2f,0x3c,0x53,0x3c,0x53,0x3e,0x3c,0x2f,0x42,0x3e,0x3c,0x42,0x3e,0x3c,0x2f,0x53,0x3e,0x3e, Step #5:
B> > Step #5: artifact_prefix='./'; Test unit written to ./oom-58011457f59b95ca7a2d56b004cabb28525fb484 Step #5: Base64: PHhtcD5CPjxCPjwvPFM8Uz48L0I+PEI+PC9TPj4= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 29 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 2015749554 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/58011457f59b95ca7a2d56b004cabb28525fb484' caused a failure at the previous merge step Step #5: MERGE-INNER: 16649 total files; 6133 processed earlier; will process 10516 files now Step #5: #1 pulse exec/s: 0 rss: 32Mb Step #5: #2 pulse exec/s: 0 rss: 32Mb Step #5: ==507== ERROR: libFuzzer: out-of-memory (used: 2166Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb=Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x72,0x45,0x7e,0x3c,0x42,0x3c,0x42,0x52,0x3c,0x3c,0x42,0x52,0x7e,0x42,0x52,0x3c,0x3c,0x42,0x52,0x3c,0x3c,0x42,0x52,0x7e,0x3c,0x3c,0x42,0x52, Step #5: Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x78,0x6d,0x70,0x3e,0x42,0x3e,0x3c,0x3f,0x3e,0x3c,0x2f,0x3c,0x53,0x3c,0x53,0x78,0x6d,0x70,0x3e,0x42,0x3e,0x3c,0x3f,0x3e,0x3c,0x2f,0x3c,0x53,0x3c,0x53, Step #5:B>> B>>Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x55,0xcb,0x3c,0x70,0x52,0x65,0xbe,0x3c,0x3c,0x44,0x45,0x4c,0x3e,0x3c,0x68,0x32,0x3e,0x3e,0x3c,0x68,0x32,0x3e,0x3c,0x3c,0x46,0x3e,0x1b,0x68,0x31,0x1a, Step #5:>
<
\033h1\032 Step #5: artifact_prefix='./'; Test unit written to ./oom-ee47ded3b1ee8be7a15e4b1759e8654bc1b2d334 Step #5: Base64: PFXLPHBSZb48PERFTD48aDI+PjxoMj48PEY+G2gxGg== Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 32 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 2119004540 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/ee47ded3b1ee8be7a15e4b1759e8654bc1b2d334' caused a failure at the previous merge step Step #5: MERGE-INNER: 16649 total files; 6307 processed earlier; will process 10342 files now Step #5: #1 pulse exec/s: 0 rss: 32Mb Step #5: #2 pulse exec/s: 0 rss: 32Mb Step #5: #4 pulse exec/s: 0 rss: 32Mb Step #5: #8 pulse exec/s: 0 rss: 32Mb Step #5: #16 pulse exec/s: 0 rss: 32Mb Step #5: ==546== ERROR: libFuzzer: out-of-memory (used: 2051Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x52,0x65,0x3e,0x3c,0x49,0x3c,0x3c,0x62,0x3c,0x3c,0x73,0x9b,0x3c,0x71,0x2b,0x3c,0x70,0x52,0x65,0x3e,0x3c,0x70,0x52,0x65,0x3e,0x3c,0x70,0x52,0x65, Step #5: Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x50,0x52,0x65,0xb8,0x55,0x3c,0x71,0x3e,0x3c,0x75,0x3e,0x3c,0x71,0x3e,0x3c,0x71,0x3e,0x3c,0x71,0x3e,0x3c,0x71,0x3e,0x3c,0x71,0x3e,0x3c,0x71,0x3e,0x3e, Step #5:> Step #5: artifact_prefix='./'; Test unit written to ./oom-e4b08479ce6e057ee8d63c8f0423e01e5b351a08 Step #5: Base64: PFBSZbhVPHE+PHU+PHE+PHE+PHE+PHE+PHE+PHE+Pg== Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 34 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 2200143889 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/e4b08479ce6e057ee8d63c8f0423e01e5b351a08' caused a failure at the previous merge step Step #5: MERGE-INNER: 16649 total files; 6377 processed earlier; will process 10272 files now Step #5: #1 pulse exec/s: 0 rss: 33Mb Step #5: #2 pulse exec/s: 0 rss: 33Mb Step #5: ==576== ERROR: libFuzzer: out-of-memory (used: 2073Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb=Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x52,0x45,0x24,0x3c,0x51,0x3c,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3f,0x3c,0x70, Step #5: Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x6e,0x6f,0x62,0x72,0x0,0x0,0x0,0x0,0x0,0x3c,0x3c,0x70,0x52,0x65,0x3e,0x42,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x3e,0x3c,0x70,0x3e,0x42,0x3c, Step #5:
B> >
B< Step #5: artifact_prefix='./'; Test unit written to ./oom-06513cfd4751671cd8ed06f67e155d92f6de011b Step #5: Base64: PG5vYnIAAAAAADw8cFJlPkI+PHA+PHA+PHA+PjxwPkI8 Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 36 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 2266310941 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/06513cfd4751671cd8ed06f67e155d92f6de011b' caused a failure at the previous merge step Step #5: MERGE-INNER: 16649 total files; 6732 processed earlier; will process 9917 files now Step #5: #1 pulse exec/s: 0 rss: 32Mb Step #5: #2 pulse exec/s: 0 rss: 32Mb Step #5: #4 pulse exec/s: 0 rss: 32Mb Step #5: ==600== ERROR: libFuzzer: out-of-memory (used: 2049Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x3c,0x42,0x52,0x3e,0x3c,0x42,0x3c,0x3c,0x70,0x52,0x45,0x2f,0x70,0x6d,0x6c,0x3e,0x6d,0x6c,0x3e,0x3c,0x2f,0x68,0x74,0x6d,0x6c,0x3e,0x52,0x3e,0x3c,0x41,0xc1,0x9, Step #5: 0
ml>