starting build "e9534b73-e8a1-4e57-acf5-ca3b2f520baf" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228" Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Sending build context to Docker daemon 5.12kB Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": latest: Pulling from oss-fuzz-base/base-builder-rust Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b549f31133a9: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": cad0867f0297: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 5d07bc49990e: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 21aae50984bf: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2b5f5f715028: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": fb6a199bc10f: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1c207e5b0063: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": caf57254f43a: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1462b1d00e14: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 540ea4dfdceb: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 8fdd4b5faaa9: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 40d7bc1ff8c7: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": d2eb4100ded1: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 156a283b0470: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e9658ec5255e: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 21aae50984bf: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c4e6646538bb: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6939a674b517: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 003b03fbacbd: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 58292fae4de9: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2b5f5f715028: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b06c7963df6e: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b6ae7f0c1d24: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 551029df1c46: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2f5903485cae: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": fb6a199bc10f: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 60671fdd34b1: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1c207e5b0063: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c1a14989bf3a: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": caf57254f43a: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 10a7a3f93f2d: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 22ef1e73dafd: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 40d7bc1ff8c7: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1462b1d00e14: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c9621467b9f7: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 540ea4dfdceb: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": d2eb4100ded1: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6e67e1dc3fc0: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 8fdd4b5faaa9: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b9c4ff0b77c8: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 155c2dfe5c67: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 156a283b0470: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b5f1ebb46627: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e959da9f743c: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b6ae7f0c1d24: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e9658ec5255e: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c66a5b9ffa39: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 551029df1c46: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 0f4fc2b4c404: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6939a674b517: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 780b129705e7: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c4e6646538bb: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": a9144c235512: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 58292fae4de9: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 003b03fbacbd: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e16fcfe620a9: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b06c7963df6e: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2f5903485cae: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c1a14989bf3a: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 60671fdd34b1: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 64f5883495aa: Pulling fs layer Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b9c4ff0b77c8: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 22ef1e73dafd: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 10a7a3f93f2d: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": a9144c235512: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c9621467b9f7: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 155c2dfe5c67: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 64f5883495aa: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e16fcfe620a9: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 0f4fc2b4c404: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b5f1ebb46627: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c66a5b9ffa39: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e959da9f743c: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6e67e1dc3fc0: Waiting Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 5d07bc49990e: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 5d07bc49990e: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b549f31133a9: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b549f31133a9: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2b5f5f715028: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2b5f5f715028: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 21aae50984bf: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 21aae50984bf: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1c207e5b0063: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1c207e5b0063: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": caf57254f43a: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": cad0867f0297: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": cad0867f0297: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b549f31133a9: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 540ea4dfdceb: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 540ea4dfdceb: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 8fdd4b5faaa9: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 8fdd4b5faaa9: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 40d7bc1ff8c7: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 40d7bc1ff8c7: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": d2eb4100ded1: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": d2eb4100ded1: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 156a283b0470: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 156a283b0470: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1462b1d00e14: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1462b1d00e14: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e9658ec5255e: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e9658ec5255e: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c4e6646538bb: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 003b03fbacbd: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 003b03fbacbd: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6939a674b517: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6939a674b517: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 58292fae4de9: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 58292fae4de9: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b06c7963df6e: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b06c7963df6e: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b6ae7f0c1d24: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b6ae7f0c1d24: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 551029df1c46: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2f5903485cae: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 60671fdd34b1: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 60671fdd34b1: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c1a14989bf3a: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c1a14989bf3a: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 10a7a3f93f2d: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 22ef1e73dafd: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6e67e1dc3fc0: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6e67e1dc3fc0: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c9621467b9f7: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c9621467b9f7: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b9c4ff0b77c8: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b9c4ff0b77c8: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b5f1ebb46627: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b5f1ebb46627: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e959da9f743c: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e959da9f743c: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": fb6a199bc10f: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": fb6a199bc10f: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": cad0867f0297: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 0f4fc2b4c404: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c66a5b9ffa39: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 780b129705e7: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 780b129705e7: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 5d07bc49990e: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": a9144c235512: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": a9144c235512: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e16fcfe620a9: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e16fcfe620a9: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 21aae50984bf: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2b5f5f715028: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 64f5883495aa: Verifying Checksum Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 64f5883495aa: Download complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": fb6a199bc10f: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1c207e5b0063: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": caf57254f43a: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 1462b1d00e14: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 540ea4dfdceb: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 8fdd4b5faaa9: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 40d7bc1ff8c7: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": d2eb4100ded1: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 156a283b0470: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e9658ec5255e: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c4e6646538bb: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6939a674b517: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 003b03fbacbd: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 58292fae4de9: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b06c7963df6e: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b6ae7f0c1d24: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 551029df1c46: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 2f5903485cae: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 60671fdd34b1: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c1a14989bf3a: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 10a7a3f93f2d: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 22ef1e73dafd: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c9621467b9f7: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 6e67e1dc3fc0: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b9c4ff0b77c8: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 155c2dfe5c67: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": b5f1ebb46627: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e959da9f743c: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": c66a5b9ffa39: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 0f4fc2b4c404: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 780b129705e7: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": a9144c235512: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": e16fcfe620a9: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": 64f5883495aa: Pull complete Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Digest: sha256:2e738d81e22ee629c40a692384a93a334d99f5c793c5c3145c938c64ad41d637 Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": ---> 220f95866a95 Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Step 2/4 : RUN git clone --depth 1 https://github.com/uutils/coreutils rust-coreutils Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": ---> Running in c79607bddbb6 Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Cloning into 'rust-coreutils'... Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Removing intermediate container c79607bddbb6 Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": ---> 5f992aec64e0 Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Step 3/4 : WORKDIR $SRC Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": ---> Running in ddce3013c8a4 Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Removing intermediate container ddce3013c8a4 Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": ---> 11dc842f620a Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Step 4/4 : COPY build.sh $SRC/ Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": ---> cecc835235fe Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Successfully built cecc835235fe Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Successfully tagged gcr.io/oss-fuzz/rust-coreutils:latest Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/rust-coreutils:latest Finished Step #1 - "build-4b87f7a5-16fb-4d05-b29a-c87c92910228" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rust-coreutils Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileVIqPOM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rust-coreutils/.git Step #2 - "srcmap": + GIT_DIR=/src/rust-coreutils Step #2 - "srcmap": + cd /src/rust-coreutils Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/uutils/coreutils Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9064619efd988b3621bd703f0bf8c3b0c1188381 Step #2 - "srcmap": + jq_inplace /tmp/fileVIqPOM '."/src/rust-coreutils" = { type: "git", url: "https://github.com/uutils/coreutils", rev: "9064619efd988b3621bd703f0bf8c3b0c1188381" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileMjjqQb Step #2 - "srcmap": + cat /tmp/fileVIqPOM Step #2 - "srcmap": + jq '."/src/rust-coreutils" = { type: "git", url: "https://github.com/uutils/coreutils", rev: "9064619efd988b3621bd703f0bf8c3b0c1188381" }' Step #2 - "srcmap": + mv /tmp/fileMjjqQb /tmp/fileVIqPOM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileVIqPOM Step #2 - "srcmap": + rm /tmp/fileVIqPOM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/rust-coreutils": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/uutils/coreutils", Step #2 - "srcmap": "rev": "9064619efd988b3621bd703f0bf8c3b0c1188381" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/rust-coreutils Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstyle-query v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstyle-parse v0.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded autocfg v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arrayref v0.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstyle v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.33 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arrayvec v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fastrand v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ctrlc v3.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quote v1.0.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_core v0.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pkg-config v0.3.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerofrom-derive v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerovec-derive v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ordered-multimap v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded z85 v3.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerofrom v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded vsimd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded yoke v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded yoke-derive v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded wild v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-ident v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerotrie v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unic-langid-impl v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerovec v0.11.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rayon-core v1.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nom v8.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded winnow v0.7.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_properties_data v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.219 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rayon v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerocopy v0.8.25 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itertools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-width v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nix v0.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-syntax v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v2.0.103 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded similar v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libm v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded typenum v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustix v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_collator_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror v2.0.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tempfile v3.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-bigint v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memchr v2.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jiff v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locale_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded onig_sys v69.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded writeable v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded version_check v0.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-automata v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tinystr v0.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tiny-keccak v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded terminal_size v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.175 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustversion v1.0.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_collections v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf8parse v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unic-langid v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror-impl v2.0.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha1 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha3 v0.10.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded self_cell v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustc-hash v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_normalizer_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locale_core v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bstr v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bigdecimal v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf8_iter v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf16_iter v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded type-map v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded synstructure v0.13.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded strsim v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded stable_deref_trait v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha2 v0.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_normalizer v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc-fast v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded clap_builder v4.5.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded blake3 v1.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sm3 v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_provider v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_collator v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded iana-time-zone v0.1.63 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.2.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.2.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded trim-in-place v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded parse_datetime v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded onig v6.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded log v0.4.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded litemap v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_properties v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locale v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent-syntax v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded once_cell v1.21.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded md-5 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded is_terminal_polyfill v1.70.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded intl_pluralrules v7.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded intl-memoizer v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hex v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded smallvec v1.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro2 v1.0.95 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rust-ini v0.21.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand v0.9.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded keccak v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded glob v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded generic-array v0.14.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent-langneg v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent-bundle v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding-macro-internal v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crunchy v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded chrono v0.4.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded outref v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded os_display v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded number_prefix v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crypto-common v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-utils v0.8.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc-catalog v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded clap v4.5.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_chacha v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ppv-lite86 v0.2.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded potential_utf v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded errno v0.3.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded dunce v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded displaydoc v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded const-random-macro v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded console v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded colorchoice v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded clap_lex v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-deque v0.8.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded blake2b_simd v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded binary-heap-plus v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded linux-raw-sys v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cpufeatures v0.2.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v2.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded base64-simd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded either v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded dlv-list v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-epoch v0.9.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc32fast v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded const-random v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cfg-if v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded block-buffer v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded digest v0.10.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding-macro v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded constant_time_eq v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded compare v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cfg_aliases v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bytecount v0.6.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstream v0.6.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro2 v1.0.95 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-ident v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.175 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg-if v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling stable_deref_trait v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling typenum v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memchr v2.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v2.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling litemap v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerocopy v0.8.25 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustix v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling writeable v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-syntax v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linux-raw-sys v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror v2.0.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locale_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling smallvec v1.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_normalizer_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg_aliases v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustc-hash v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf8parse v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_collator_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstyle-query v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling colorchoice v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling is_terminal_polyfill v1.70.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustversion v1.0.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libm v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstyle v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling either v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arrayref v0.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nix v0.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling type-map v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstyle-parse v0.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-width v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling clap_lex v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling constant_time_eq v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc-catalog v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling strsim v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cpufeatures v0.2.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstream v0.6.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arrayvec v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling self_cell v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling outref v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf16_iter v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vsimd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling keccak v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uucore v0.2.2 (/src/rust-coreutils/src/uucore) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf8_iter v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling os_display v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itertools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc32fast v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hex v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling glob v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling wild v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling blake2b_simd v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling z85 v3.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling dunce v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling number_prefix v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crunchy v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tiny-keccak v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bigdecimal v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-utils v0.8.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling once_cell v1.21.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pkg-config v0.3.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rayon-core v1.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling iana-time-zone v0.1.63 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fastrand v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling winnow v0.7.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bytecount v0.6.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling compare v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling trim-in-place v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nom v8.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling binary-heap-plus v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling similar v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling base64-simd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jiff v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quote v1.0.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v2.0.103 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uucore_procs v0.2.2 (/src/rust-coreutils/src/uucore_procs) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-epoch v0.9.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.33 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.2.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling const-random-macro v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-deque v0.8.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.2.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling chrono v0.4.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling const-random v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sm3 v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha1 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha3 v0.10.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling md-5 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha2 v0.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling dlv-list v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-bigint v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rayon v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ordered-multimap v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ppv-lite86 v0.2.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling console v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-automata v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rust-ini v0.21.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_core v0.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_chacha v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling blake3 v1.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling onig_sys v69.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand v0.9.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling terminal_size v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tempfile v3.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling clap_builder v4.5.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling synstructure v0.13.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ctrlc v3.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerofrom-derive v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling yoke-derive v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerovec-derive v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling displaydoc v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror-impl v2.0.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding-macro-internal v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bstr v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling clap v4.5.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling parse_datetime v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding-macro v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc-fast v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerofrom v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling yoke v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerovec v0.11.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerotrie v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling onig v6.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent-syntax v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tinystr v0.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling potential_utf v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_collections v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unic-langid-impl v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locale_core v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unic-langid v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling intl_pluralrules v7.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent-langneg v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling intl-memoizer v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent-bundle v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_provider v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_properties v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locale v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_normalizer v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_collator v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_cksum v0.2.2 (/src/rust-coreutils/src/uu/cksum) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_printf v0.2.2 (/src/rust-coreutils/src/uu/printf) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uufuzz v0.2.2 (/src/rust-coreutils/fuzz/uufuzz) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_wc v0.2.2 (/src/rust-coreutils/src/uu/wc) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_test v0.2.2 (/src/rust-coreutils/src/uu/test) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_sort v0.2.2 (/src/rust-coreutils/src/uu/sort) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_date v0.2.2 (/src/rust-coreutils/src/uu/date) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_split v0.2.2 (/src/rust-coreutils/src/uu/split) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_tr v0.2.2 (/src/rust-coreutils/src/uu/tr) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_env v0.2.2 (/src/rust-coreutils/src/uu/env) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_seq v0.2.2 (/src/rust-coreutils/src/uu/seq) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_cut v0.2.2 (/src/rust-coreutils/src/uu/cut) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_echo v0.2.2 (/src/rust-coreutils/src/uu/echo) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_expr v0.2.2 (/src/rust-coreutils/src/uu/expr) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uucore-fuzz v0.0.0 (/src/rust-coreutils/fuzz) Step #3 - "compile-libfuzzer-coverage-x86_64":  Finished `dev` profile [unoptimized + debuginfo] target(s) in 20.59s Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep 'name =' fuzz/Cargo.toml Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d"' -f2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v uucore-fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + PROG='fuzz_date Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_printf Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_echo Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_seq Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_sort Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_split Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_cut Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_wc Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_expr Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_test Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_seq_parse_number Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_parse_glob Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_parse_size Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_parse_time Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_tr Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_env Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_cksum Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_non_utf8_paths' Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_date /workspace/out/libfuzzer-coverage-x86_64/fuzz_date Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_printf /workspace/out/libfuzzer-coverage-x86_64/fuzz_printf Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_echo /workspace/out/libfuzzer-coverage-x86_64/fuzz_echo Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_seq /workspace/out/libfuzzer-coverage-x86_64/fuzz_seq Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_sort /workspace/out/libfuzzer-coverage-x86_64/fuzz_sort Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_split /workspace/out/libfuzzer-coverage-x86_64/fuzz_split Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_cut /workspace/out/libfuzzer-coverage-x86_64/fuzz_cut Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_wc /workspace/out/libfuzzer-coverage-x86_64/fuzz_wc Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_expr /workspace/out/libfuzzer-coverage-x86_64/fuzz_expr Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_test /workspace/out/libfuzzer-coverage-x86_64/fuzz_test Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_seq_parse_number /workspace/out/libfuzzer-coverage-x86_64/fuzz_seq_parse_number Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_parse_glob /workspace/out/libfuzzer-coverage-x86_64/fuzz_parse_glob Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_parse_size /workspace/out/libfuzzer-coverage-x86_64/fuzz_parse_size Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_parse_time /workspace/out/libfuzzer-coverage-x86_64/fuzz_parse_time Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_tr /workspace/out/libfuzzer-coverage-x86_64/fuzz_tr Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_env /workspace/out/libfuzzer-coverage-x86_64/fuzz_env Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_cksum /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_non_utf8_paths /workspace/out/libfuzzer-coverage-x86_64/fuzz_non_utf8_paths Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: cad0867f0297: Already exists Step #4: 5d07bc49990e: Already exists Step #4: 44cb0126eb9f: Pulling fs layer Step #4: a56ff748a9a8: Pulling fs layer Step #4: a2fb0ed9e009: Pulling fs layer Step #4: f1c66ff839e8: Pulling fs layer Step #4: 6407c60781cb: Pulling fs layer Step #4: 2aedbca4b0c5: Pulling fs layer Step #4: 5eb917c1be4c: Pulling fs layer Step #4: b14d900f9083: Pulling fs layer Step #4: 147a0260c0e7: Pulling fs layer Step #4: 45ecb17becc3: Pulling fs layer Step #4: 4b12f89cab71: Pulling fs layer Step #4: 0264e9dc4f17: Pulling fs layer Step #4: 604b903d86bc: Pulling fs layer Step #4: 74ceb0df6853: Pulling fs layer Step #4: c464a0b74cc6: Pulling fs layer Step #4: 32bac08d0f41: Pulling fs layer Step #4: 313c0e14775f: Pulling fs layer Step #4: 54b5966c5152: Pulling fs layer Step #4: e4d1c52c51e5: Pulling fs layer Step #4: 6c2a7aea9205: Pulling fs layer Step #4: 96c0e9d3caa1: Pulling fs layer Step #4: fe059bb13cd6: Pulling fs layer Step #4: 5eb917c1be4c: Waiting Step #4: bd1214b0ceb5: Pulling fs layer Step #4: b14d900f9083: Waiting Step #4: 147a0260c0e7: Waiting Step #4: 604b903d86bc: Waiting Step #4: 313c0e14775f: Waiting Step #4: 45ecb17becc3: Waiting Step #4: 54b5966c5152: Waiting Step #4: 4b12f89cab71: Waiting Step #4: e4d1c52c51e5: Waiting Step #4: 32bac08d0f41: Waiting Step #4: 0264e9dc4f17: Waiting Step #4: 6c2a7aea9205: Waiting Step #4: 74ceb0df6853: Waiting Step #4: bd1214b0ceb5: Waiting Step #4: fe059bb13cd6: Waiting Step #4: c464a0b74cc6: Waiting Step #4: a2fb0ed9e009: Verifying Checksum Step #4: a2fb0ed9e009: Download complete Step #4: 44cb0126eb9f: Download complete Step #4: a56ff748a9a8: Verifying Checksum Step #4: a56ff748a9a8: Download complete Step #4: 6407c60781cb: Verifying Checksum Step #4: 6407c60781cb: Download complete Step #4: 44cb0126eb9f: Pull complete Step #4: f1c66ff839e8: Verifying Checksum Step #4: f1c66ff839e8: Download complete Step #4: 5eb917c1be4c: Verifying Checksum Step #4: 5eb917c1be4c: Download complete Step #4: b14d900f9083: Verifying Checksum Step #4: b14d900f9083: Download complete Step #4: 147a0260c0e7: Verifying Checksum Step #4: 147a0260c0e7: Download complete Step #4: a56ff748a9a8: Pull complete Step #4: a2fb0ed9e009: Pull complete Step #4: 4b12f89cab71: Verifying Checksum Step #4: 4b12f89cab71: Download complete Step #4: 2aedbca4b0c5: Verifying Checksum Step #4: 2aedbca4b0c5: Download complete Step #4: 0264e9dc4f17: Download complete Step #4: f1c66ff839e8: Pull complete Step #4: 604b903d86bc: Verifying Checksum Step #4: 604b903d86bc: Download complete Step #4: 6407c60781cb: Pull complete Step #4: 45ecb17becc3: Download complete Step #4: c464a0b74cc6: Verifying Checksum Step #4: c464a0b74cc6: Download complete Step #4: 313c0e14775f: Verifying Checksum Step #4: 313c0e14775f: Download complete Step #4: 74ceb0df6853: Verifying Checksum Step #4: 74ceb0df6853: Download complete Step #4: 54b5966c5152: Verifying Checksum Step #4: 54b5966c5152: Download complete Step #4: e4d1c52c51e5: Verifying Checksum Step #4: e4d1c52c51e5: Download complete Step #4: 6c2a7aea9205: Verifying Checksum Step #4: 6c2a7aea9205: Download complete Step #4: fe059bb13cd6: Verifying Checksum Step #4: fe059bb13cd6: Download complete Step #4: 96c0e9d3caa1: Verifying Checksum Step #4: 96c0e9d3caa1: Download complete Step #4: 32bac08d0f41: Verifying Checksum Step #4: 32bac08d0f41: Download complete Step #4: bd1214b0ceb5: Verifying Checksum Step #4: bd1214b0ceb5: Download complete Step #4: 2aedbca4b0c5: Pull complete Step #4: 5eb917c1be4c: Pull complete Step #4: b14d900f9083: Pull complete Step #4: 147a0260c0e7: Pull complete Step #4: 45ecb17becc3: Pull complete Step #4: 4b12f89cab71: Pull complete Step #4: 0264e9dc4f17: Pull complete Step #4: 604b903d86bc: Pull complete Step #4: 74ceb0df6853: Pull complete Step #4: c464a0b74cc6: Pull complete Step #4: 32bac08d0f41: Pull complete Step #4: 313c0e14775f: Pull complete Step #4: 54b5966c5152: Pull complete Step #4: e4d1c52c51e5: Pull complete Step #4: 6c2a7aea9205: Pull complete Step #4: 96c0e9d3caa1: Pull complete Step #4: fe059bb13cd6: Pull complete Step #4: bd1214b0ceb5: Pull complete Step #4: Digest: sha256:1460e902b030400f5fbce4acc2bf327c3ba685fdf776441a215e2ee91092082e Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running fuzz_printf Step #5: Running fuzz_echo Step #5: Running fuzz_seq_parse_number Step #5: Running fuzz_cksum Step #5: Running fuzz_sort Step #5: Running fuzz_parse_glob Step #5: Running fuzz_env Step #5: Running fuzz_split Step #5: Running fuzz_parse_size Step #5: Running fuzz_cut Step #5: Running fuzz_seq Step #5: [2025-10-03 06:09:04,644 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:04,655 INFO] Finished finding shared libraries for targets. Step #5: Error occured while running fuzz_printf: Step #5: Cov returncode: 0, grep returncode: 0 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031579976 Step #5: MERGE-OUTER: 388 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031595084 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge57.txt' Step #5: MERGE-INNER: 388 total files; 0 processed earlier; will process 388 files now Step #5: Running test ["printf", "%c", "800"] Step #5: === Compare result for: printf ["%c", "800"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%s", "CT\\000"] Step #5: === Compare result for: printf ["%s", "CT\\000"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "(ÃÃ"] Step #5: === Compare result for: printf ["%s", "(ÃÃ"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%z\\a"] Step #5: === Compare result for: printf ["%z\\a"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "%673"] Step #5: === Compare result for: printf ["%f", "%673"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "170"] Step #5: === Compare result for: printf ["%x", "170"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%132"] Step #5: === Compare result for: printf ["%s", "%132"] Step #5: === OK Same behavior Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%f", "166"] Step #5: === Compare result for: printf ["%f", "166"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "4"] Step #5: === Compare result for: printf ["%q", "4"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "52"] Step #5: === Compare result for: printf ["%x", "52"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "770"] Step #5: === Compare result for: printf ["%f", "770"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "505"] Step #5: === Compare result for: printf ["%f", "505"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "1000"] Step #5: === Compare result for: printf ["%x", "1000"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "77"] Step #5: === Compare result for: printf ["%c", "77"] Step #5: === OK Same behavior Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "372"] Step #5: === Compare result for: printf ["%o", "372"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "964\\t"] Step #5: === Compare result for: printf ["%d", "964\\t"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "27"] Step #5: === Compare result for: printf ["%b", "27"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "%144"] Step #5: === Compare result for: printf ["%f", "%144"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "884"] Step #5: === Compare result for: printf ["%f", "884"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "295"] Step #5: === Compare result for: printf ["%o", "295"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "504"] Step #5: === Compare result for: printf ["%o", "504"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "%240"] Step #5: === Compare result for: printf ["%q", "%240"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "561"] Step #5: === Compare result for: printf ["%o", "561"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "175"] Step #5: === Compare result for: printf ["%q", "175"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "352"] Step #5: === Compare result for: printf ["%f", "352"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "121"] Step #5: === Compare result for: printf ["%d", "121"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "300"] Step #5: === Compare result for: printf ["%d", "300"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%f", "470"] Step #5: === Compare result for: printf ["%f", "470"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "638\\t"] Step #5: === Compare result for: printf ["%q", "638\\t"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "813"] Step #5: === Compare result for: printf ["%x", "813"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "422\\\\"] Step #5: === Compare result for: printf ["%c", "422\\\\"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "152"] Step #5: === Compare result for: printf ["%b", "152"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "%388"] Step #5: === Compare result for: printf ["%q", "%388"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "312\\v"] Step #5: === Compare result for: printf ["%c", "312\\v"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "903"] Step #5: === Compare result for: printf ["%c", "903"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "144"] Step #5: === Compare result for: printf ["%b", "144"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "295"] Step #5: === Compare result for: printf ["%q", "295"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "274"] Step #5: === Compare result for: printf ["%f", "274"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "900"] Step #5: === Compare result for: printf ["%d", "900"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "618"] Step #5: === Compare result for: printf ["%d", "618"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "444"] Step #5: === Compare result for: printf ["%b", "444"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "45"] Step #5: === Compare result for: printf ["%q", "45"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "279"] Step #5: === Compare result for: printf ["%q", "279"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "1"] Step #5: === Compare result for: printf ["%s", "1"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "66"] Step #5: === Compare result for: printf ["%q", "66"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "471"] Step #5: === Compare result for: printf ["%c", "471"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "627"] Step #5: === Compare result for: printf ["%b", "627"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "147"] Step #5: === Compare result for: printf ["%o", "147"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "%32"] Step #5: === Compare result for: printf ["%q", "%32"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%168"] Step #5: === Compare result for: printf ["%d", "%168"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "641"] Step #5: === Compare result for: printf ["%x", "641"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "308\\r"] Step #5: === Compare result for: printf ["%b", "308\\r"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "793"] Step #5: === Compare result for: printf ["%f", "793"] Step #5: === OK Same behavior Step #5: Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%x", "966"] Step #5: === Compare result for: printf ["%x", "966"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "502"] Step #5: === Compare result for: printf ["%q", "502"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "405"] Step #5: === Compare result for: printf ["%x", "405"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "307"] Step #5: === Compare result for: printf ["%f", "307"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "308"] Step #5: === Compare result for: printf ["%d", "308"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "77"] Step #5: === Compare result for: printf ["%q", "77"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s"] Step #5: === Compare result for: printf ["%s"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "661\\v"] Step #5: === Compare result for: printf ["%q", "661\\v"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "596"] Step #5: === Compare result for: printf ["%c", "596"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%927"] Step #5: === Compare result for: printf ["%x", "%927"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%33"] Step #5: === Compare result for: printf ["%x", "%33"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%927"] Step #5: === Compare result for: printf ["%d", "%927"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%794"] Step #5: === Compare result for: printf ["%x", "%794"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z\\u0000"] Step #5: === Compare result for: printf ["%z\\u0000"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "74"] Step #5: === Compare result for: printf ["%f", "74"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "998"] Step #5: === Compare result for: printf ["%q", "998"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "710"] Step #5: === Compare result for: printf ["%c", "710"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "436"] Step #5: === Compare result for: printf ["%d", "436"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "%720"] Step #5: === Compare result for: printf ["%o", "%720"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%461"] Step #5: === Compare result for: printf ["%x", "%461"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "868\\f"] Step #5: === Compare result for: printf ["%b", "868\\f"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "17"] Step #5: === Compare result for: printf ["%c", "17"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "302"] Step #5: === Compare result for: printf ["%c", "302"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "252"] Step #5: === Compare result for: printf ["%o", "252"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "417"] Step #5: === Compare result for: printf ["%b", "417"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "978"] Step #5: === Compare result for: printf ["%d", "978"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "%863"] Step #5: === Compare result for: printf ["%c", "%863"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "146"] Step #5: === Compare result for: printf ["%c", "146"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "505"] Step #5: === Compare result for: printf ["%o", "505"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z\\v"] Step #5: === Compare result for: printf ["%z\\v"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "135"] Step #5: === Compare result for: printf ["%q", "135"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "265"] Step #5: === Compare result for: printf ["%d", "265"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "325"] Step #5: === Compare result for: printf ["%o", "325"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "370"] Step #5: === Compare result for: printf ["%c", "370"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "529"] Step #5: === Compare result for: printf ["%x", "529"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "617"] Step #5: === Compare result for: printf ["%o", "617"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "802"] Step #5: === Compare result for: printf ["%d", "802"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "442"] Step #5: === Compare result for: printf ["%d", "442"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "487"] Step #5: === Compare result for: printf ["%x", "487"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "59"] Step #5: === Compare result for: printf ["%o", "59"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s"] Step #5: === Compare result for: printf ["%s"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "277"] Step #5: === Compare result for: printf ["%x", "277"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "8"] Step #5: === Compare result for: printf ["%s", "8"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%570"] Step #5: === Compare result for: printf ["%d", "%570"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "601"] Step #5: === Compare result for: printf ["%f", "601"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "925"] Step #5: === Compare result for: printf ["%o", "925"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "440"] Step #5: === Compare result for: printf ["%x", "440"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "307"] Step #5: === Compare result for: printf ["%f", "307"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "772"] Step #5: === Compare result for: printf ["%c", "772"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "752"] Step #5: === Compare result for: printf ["%o", "752"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "451"] Step #5: === Compare result for: printf ["%b", "451"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "\\a"] Step #5: === Compare result for: printf ["%s", "\\a"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "606"] Step #5: === Compare result for: printf ["%o", "606"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "402"] Step #5: === Compare result for: printf ["%c", "402"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: #128 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%x", "582"] Step #5: === Compare result for: printf ["%x", "582"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "399"] Step #5: === Compare result for: printf ["%q", "399"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%118"] Step #5: === Compare result for: printf ["%s", "%118"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "574"] Step #5: === Compare result for: printf ["%q", "574"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "526"] Step #5: === Compare result for: printf ["%d", "526"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "512"] Step #5: === Compare result for: printf ["%b", "512"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "387"] Step #5: === Compare result for: printf ["%b", "387"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "%656"] Step #5: === Compare result for: printf ["%c", "%656"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "339"] Step #5: === Compare result for: printf ["%q", "339"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "653\\b"] Step #5: === Compare result for: printf ["%x", "653\\b"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "Ã\\\\"] Step #5: === Compare result for: printf ["%s", "Ã\\\\"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "%506"] Step #5: === Compare result for: printf ["%c", "%506"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "%719"] Step #5: === Compare result for: printf ["%f", "%719"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "596"] Step #5: === Compare result for: printf ["%d", "596"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "%296"] Step #5: === Compare result for: printf ["%c", "%296"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "Ã\u{fe0f}N(("] Step #5: === Compare result for: printf ["%s", "Ã\u{fe0f}N(("] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "541"] Step #5: === Compare result for: printf ["%o", "541"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "658\\c"] Step #5: === Compare result for: printf ["%f", "658\\c"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "103"] Step #5: === Compare result for: printf ["%x", "103"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "673"] Step #5: === Compare result for: printf ["%f", "673"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%370"] Step #5: === Compare result for: printf ["%s", "%370"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "121"] Step #5: === Compare result for: printf ["%d", "121"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%141\\f"] Step #5: === Compare result for: printf ["%d", "%141\\f"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "341"] Step #5: === Compare result for: printf ["%o", "341"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "986\\n"] Step #5: === Compare result for: printf ["%f", "986\\n"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "312"] Step #5: === Compare result for: printf ["%q", "312"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "%216"] Step #5: === Compare result for: printf ["%q", "%216"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "570"] Step #5: === Compare result for: printf ["%q", "570"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "789"] Step #5: === Compare result for: printf ["%b", "789"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "87"] Step #5: === Compare result for: printf ["%b", "87"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "ÃZ"] Step #5: === Compare result for: printf ["%s", "ÃZ"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "375"] Step #5: === Compare result for: printf ["%d", "375"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "785"] Step #5: === Compare result for: printf ["%b", "785"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "%1000"] Step #5: === Compare result for: printf ["%f", "%1000"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%518"] Step #5: === Compare result for: printf ["%x", "%518"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "661"] Step #5: === Compare result for: printf ["%d", "661"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "423"] Step #5: === Compare result for: printf ["%f", "423"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "%378"] Step #5: === Compare result for: printf ["%f", "%378"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "483"] Step #5: === Compare result for: printf ["%q", "483"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "283"] Step #5: === Compare result for: printf ["%o", "283"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "%323"] Step #5: === Compare result for: printf ["%o", "%323"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "31"] Step #5: === Compare result for: printf ["%f", "31"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "461"] Step #5: === Compare result for: printf ["%c", "461"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%261"] Step #5: === Compare result for: printf ["%s", "%261"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%676\\\\"] Step #5: === Compare result for: printf ["%d", "%676\\\\"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "%419"] Step #5: === Compare result for: printf ["%c", "%419"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "712"] Step #5: === Compare result for: printf ["%d", "712"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "968"] Step #5: === Compare result for: printf ["%f", "968"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%897"] Step #5: === Compare result for: printf ["%d", "%897"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "%823\\b"] Step #5: === Compare result for: printf ["%q", "%823\\b"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "283"] Step #5: === Compare result for: printf ["%f", "283"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "539"] Step #5: === Compare result for: printf ["%x", "539"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "266"] Step #5: === Compare result for: printf ["%x", "266"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "138\\x00"] Step #5: === Compare result for: printf ["%x", "138\\x00"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "7"] Step #5: === Compare result for: printf ["%b", "7"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "302"] Step #5: === Compare result for: printf ["%o", "302"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "519"] Step #5: === Compare result for: printf ["%d", "519"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "%292"] Step #5: === Compare result for: printf ["%b", "%292"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "43"] Step #5: === Compare result for: printf ["%d", "43"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "183"] Step #5: === Compare result for: printf ["%f", "183"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "586"] Step #5: === Compare result for: printf ["%b", "586"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "502"] Step #5: === Compare result for: printf ["%x", "502"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "951"] Step #5: === Compare result for: printf ["%d", "951"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "VxrP"] Step #5: === Compare result for: printf ["%s", "VxrP"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "259"] Step #5: === Compare result for: printf ["%d", "259"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "195"] Step #5: === Compare result for: printf ["%b", "195"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "1"] Step #5: === Compare result for: printf ["%f", "1"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%220"] Step #5: === Compare result for: printf ["%x", "%220"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "292"] Step #5: === Compare result for: printf ["%b", "292"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%785"] Step #5: === Compare result for: printf ["%d", "%785"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "%973"] Step #5: === Compare result for: printf ["%o", "%973"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "811\\n"] Step #5: === Compare result for: printf ["%b", "811\\n"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "452\\b"] Step #5: === Compare result for: printf ["%f", "452\\b"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "121"] Step #5: === Compare result for: printf ["%x", "121"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "(jÃvv"] Step #5: === Compare result for: printf ["%s", "(jÃvv"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "%763\\r"] Step #5: === Compare result for: printf ["%b", "%763\\r"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "6\\\""] Step #5: === Compare result for: printf ["%o", "6\\\""] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "419\\000"] Step #5: === Compare result for: printf ["%b", "419\\000"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "926"] Step #5: === Compare result for: printf ["%f", "926"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%554"] Step #5: === Compare result for: printf ["%s", "%554"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "122%%"] Step #5: === Compare result for: printf ["%b", "122%%"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s"] Step #5: === Compare result for: printf ["%s"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "195"] Step #5: === Compare result for: printf ["%d", "195"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "%17"] Step #5: === Compare result for: printf ["%b", "%17"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "644"] Step #5: === Compare result for: printf ["%q", "644"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "759"] Step #5: === Compare result for: printf ["%o", "759"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "%394\\v"] Step #5: === Compare result for: printf ["%o", "%394\\v"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "192"] Step #5: === Compare result for: printf ["%q", "192"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "15"] Step #5: === Compare result for: printf ["%d", "15"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "m"] Step #5: === Compare result for: printf ["%s", "m"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "%308"] Step #5: === Compare result for: printf ["%c", "%308"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "\\c"] Step #5: === Compare result for: printf ["%s", "\\c"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "%739"] Step #5: === Compare result for: printf ["%o", "%739"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "979\\000"] Step #5: === Compare result for: printf ["%b", "979\\000"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "704"] Step #5: === Compare result for: printf ["%q", "704"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "82"] Step #5: === Compare result for: printf ["%d", "82"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "%439"] Step #5: === Compare result for: printf ["%b", "%439"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%491\\n"] Step #5: === Compare result for: printf ["%s", "%491\\n"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "q(u"] Step #5: === Compare result for: printf ["%s", "q(u"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: #256 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%o", "394"] Step #5: === Compare result for: printf ["%o", "394"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "341"] Step #5: === Compare result for: printf ["%q", "341"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "825"] Step #5: === Compare result for: printf ["%q", "825"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "67"] Step #5: === Compare result for: printf ["%b", "67"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "474"] Step #5: === Compare result for: printf ["%q", "474"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "155"] Step #5: === Compare result for: printf ["%f", "155"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "931"] Step #5: === Compare result for: printf ["%o", "931"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "297\\b"] Step #5: === Compare result for: printf ["%q", "297\\b"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "555"] Step #5: === Compare result for: printf ["%f", "555"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "265"] Step #5: === Compare result for: printf ["%f", "265"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "133"] Step #5: === Compare result for: printf ["%b", "133"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "383"] Step #5: === Compare result for: printf ["%d", "383"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "171"] Step #5: === Compare result for: printf ["%c", "171"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "577"] Step #5: === Compare result for: printf ["%x", "577"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "627"] Step #5: === Compare result for: printf ["%c", "627"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%288"] Step #5: === Compare result for: printf ["%x", "%288"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "551"] Step #5: === Compare result for: printf ["%c", "551"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "%546%%"] Step #5: === Compare result for: printf ["%o", "%546%%"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "650"] Step #5: === Compare result for: printf ["%q", "650"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "(l6\\x00"] Step #5: === Compare result for: printf ["%s", "(l6\\x00"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "271\\a"] Step #5: === Compare result for: printf ["%o", "271\\a"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "4O8PbzPZtb"] Step #5: === Compare result for: printf ["%s", "4O8PbzPZtb"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "17"] Step #5: === Compare result for: printf ["%o", "17"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "788"] Step #5: === Compare result for: printf ["%f", "788"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "322"] Step #5: === Compare result for: printf ["%b", "322"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "81"] Step #5: === Compare result for: printf ["%f", "81"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "979"] Step #5: === Compare result for: printf ["%f", "979"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "396"] Step #5: === Compare result for: printf ["%d", "396"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z\\n"] Step #5: === Compare result for: printf ["%z\\n"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%179\\000"] Step #5: === Compare result for: printf ["%d", "%179\\000"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "414"] Step #5: === Compare result for: printf ["%f", "414"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%526"] Step #5: === Compare result for: printf ["%d", "%526"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "459"] Step #5: === Compare result for: printf ["%o", "459"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "799"] Step #5: === Compare result for: printf ["%b", "799"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "309"] Step #5: === Compare result for: printf ["%f", "309"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "272\\c"] Step #5: === Compare result for: printf ["%q", "272\\c"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s"] Step #5: === Compare result for: printf ["%s"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "231"] Step #5: === Compare result for: printf ["%c", "231"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "520"] Step #5: === Compare result for: printf ["%c", "520"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "968\\x00"] Step #5: === Compare result for: printf ["%d", "968\\x00"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "Ã3Y2MO"] Step #5: === Compare result for: printf ["%s", "Ã3Y2MO"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "449\\x00"] Step #5: === Compare result for: printf ["%f", "449\\x00"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "137"] Step #5: === Compare result for: printf ["%x", "137"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "386"] Step #5: === Compare result for: printf ["%b", "386"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "744"] Step #5: === Compare result for: printf ["%d", "744"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "386"] Step #5: === Compare result for: printf ["%d", "386"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "pAz7S"] Step #5: === Compare result for: printf ["%s", "pAz7S"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "647"] Step #5: === Compare result for: printf ["%q", "647"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "265"] Step #5: === Compare result for: printf ["%b", "265"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "%735\\e"] Step #5: === Compare result for: printf ["%d", "%735\\e"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "RWyDoFc"] Step #5: === Compare result for: printf ["%s", "RWyDoFc"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "166"] Step #5: === Compare result for: printf ["%d", "166"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "%961\\u0000"] Step #5: === Compare result for: printf ["%b", "%961\\u0000"] Step #5: Rust stdout: Step #5: %961 Step #5: GNU stdout: Step #5: %961 Step #5: --- START diff Step #5: -%961 Step #5: +%961 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid universal character name \u0000 Step #5: --- START diff Step #5: +invalid universal character name \u0000 Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: printf ["%b", "%961\\u0000"] Step #5: Step #5: thread '' (60) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: printf ["%b", "%961\\u0000"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==60== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0xe9,0x8d,0x8c,0xe9,0x8c,0x8c,0xe9,0x8c,0x8c,0xe9,0x8c,0x8c,0xe9,0x8c,0x8c,0xe9,0x8c,0x8c,0xe9,0x8c,0x8c,0xe9,0x8c,0x8c,0x3e, Step #5: <\351\215\214\351\214\214\351\214\214\351\214\214\351\214\214\351\214\214\351\214\214\351\214\214> Step #5: artifact_prefix='./'; Test unit written to ./crash-4bd331a0df5d4bfb3228eb1e6a12813e5cad659b Step #5: Base64: POmNjOmMjOmMjOmMjOmMjOmMjOmMjOmMjD4= Step #5: MERGE-OUTER: attempt 2 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032171134 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge57.txt' Step #5: MERGE-INNER: '/corpus/fuzz_printf/4bd331a0df5d4bfb3228eb1e6a12813e5cad659b' caused a failure at the previous merge step Step #5: MERGE-INNER: 388 total files; 317 processed earlier; will process 71 files now Step #5: Running test ["printf", "%x", "367"] Step #5: === Compare result for: printf ["%x", "367"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%f", "903"] Step #5: === Compare result for: printf ["%f", "903"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "%79\\\""] Step #5: === Compare result for: printf ["%c", "%79\\\""] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%b", "919"] Step #5: === Compare result for: printf ["%b", "919"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "166"] Step #5: === Compare result for: printf ["%q", "166"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s"] Step #5: === Compare result for: printf ["%s"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "776"] Step #5: === Compare result for: printf ["%f", "776"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "24"] Step #5: === Compare result for: printf ["%q", "24"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "422"] Step #5: === Compare result for: printf ["%c", "422"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "8("] Step #5: === Compare result for: printf ["%s", "8("] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "793"] Step #5: === Compare result for: printf ["%f", "793"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "145"] Step #5: === Compare result for: printf ["%q", "145"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "115"] Step #5: === Compare result for: printf ["%d", "115"] Step #5: === OK Same behavior Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "975"] Step #5: === Compare result for: printf ["%o", "975"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "843"] Step #5: === Compare result for: printf ["%c", "843"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z\\v"] Step #5: === Compare result for: printf ["%z\\v"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "640"] Step #5: === Compare result for: printf ["%x", "640"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "79"] Step #5: === Compare result for: printf ["%d", "79"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "941"] Step #5: === Compare result for: printf ["%b", "941"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "73"] Step #5: === Compare result for: printf ["%d", "73"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "721"] Step #5: === Compare result for: printf ["%q", "721"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "🪛RxlJM9"] Step #5: === Compare result for: printf ["%s", "🪛RxlJM9"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "440"] Step #5: === Compare result for: printf ["%d", "440"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "356"] Step #5: === Compare result for: printf ["%x", "356"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "60"] Step #5: === Compare result for: printf ["%d", "60"] Step #5: === OK Same behavior Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%x", "847"] Step #5: === Compare result for: printf ["%x", "847"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "80"] Step #5: === Compare result for: printf ["%b", "80"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "570"] Step #5: === Compare result for: printf ["%o", "570"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z\\f"] Step #5: === Compare result for: printf ["%z\\f"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "%609"] Step #5: === Compare result for: printf ["%f", "%609"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "%5\\\""] Step #5: === Compare result for: printf ["%o", "%5\\\""] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "722\\e"] Step #5: === Compare result for: printf ["%o", "722\\e"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "314"] Step #5: === Compare result for: printf ["%c", "314"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%147"] Step #5: === Compare result for: printf ["%s", "%147"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%563"] Step #5: === Compare result for: printf ["%x", "%563"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "940"] Step #5: === Compare result for: printf ["%x", "940"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "🧰"] Step #5: === Compare result for: printf ["%s", "🧰"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%335"] Step #5: === Compare result for: printf ["%s", "%335"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "647"] Step #5: === Compare result for: printf ["%x", "647"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "769\\r"] Step #5: === Compare result for: printf ["%x", "769\\r"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "105"] Step #5: === Compare result for: printf ["%c", "105"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "%350"] Step #5: === Compare result for: printf ["%s", "%350"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "451"] Step #5: === Compare result for: printf ["%f", "451"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%o", "804\\b"] Step #5: === Compare result for: printf ["%o", "804\\b"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%c", "848\\U00000000"] Step #5: === Compare result for: printf ["%c", "848\\U00000000"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "02yp"] Step #5: === Compare result for: printf ["%s", "02yp"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "844\\U00000000"] Step #5: === Compare result for: printf ["%b", "844\\U00000000"] Step #5: Rust stdout: Step #5: 844 Step #5: GNU stdout: Step #5: 844 Step #5: --- START diff Step #5: -844 Step #5: +844 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid universal character name \U00000000 Step #5: --- START diff Step #5: +invalid universal character name \U00000000 Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: printf ["%b", "844\\U00000000"] Step #5: Step #5: thread '' (3401) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: printf ["%b", "844\\U00000000"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3401== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-17e9cfdfb68843ce3502c0c3506cf7b4dad30443 Step #5: MERGE-OUTER: attempt 3 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032292409 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge57.txt' Step #5: MERGE-INNER: '/corpus/fuzz_printf/17e9cfdfb68843ce3502c0c3506cf7b4dad30443' caused a failure at the previous merge step Step #5: MERGE-INNER: 388 total files; 374 processed earlier; will process 14 files now Step #5: Running test ["printf", "%x", "%38"] Step #5: === Compare result for: printf ["%x", "%38"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%b", "46"] Step #5: === Compare result for: printf ["%b", "46"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%x", "%267"] Step #5: === Compare result for: printf ["%x", "%267"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%q", "291"] Step #5: === Compare result for: printf ["%q", "291"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%q", "585"] Step #5: === Compare result for: printf ["%q", "585"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s", "cB"] Step #5: === Compare result for: printf ["%s", "cB"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%s"] Step #5: === Compare result for: printf ["%s"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "245"] Step #5: === Compare result for: printf ["%x", "245"] Step #5: === OK Same behavior Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["printf", "%o", "378"] Step #5: === Compare result for: printf ["%o", "378"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%b", "145"] Step #5: === Compare result for: printf ["%b", "145"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%z"] Step #5: === Compare result for: printf ["%z"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%f", "%716"] Step #5: === Compare result for: printf ["%f", "%716"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%d", "45"] Step #5: === Compare result for: printf ["%d", "45"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["printf", "%x", "%931"] Step #5: === Compare result for: printf ["%x", "%931"] Step #5: === OK Same behavior Step #5: Step #5: #14 DONE exec/s: 0 rss: 30Mb Step #5: MERGE-OUTER: successful in 3 attempt(s) Step #5: MERGE-OUTER: the control file has 34788 bytes Step #5: MERGE-OUTER: consumed 0Mb (26Mb rss) to parse the control file Step #5: MERGE-OUTER: 0 new files with 0 new features added; 0 new coverage edges Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_echo_error.log Step #5: [2025-10-03 06:09:05,105 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:05,115 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_printf_error.log Step #5: [2025-10-03 06:09:05,607 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:05,617 INFO] Finished finding shared libraries for targets. Step #5: Error occured while running fuzz_seq: Step #5: Cov returncode: 0, grep returncode: 0 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031998369 Step #5: MERGE-OUTER: 317 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032014541 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge2215.txt' Step #5: MERGE-INNER: 317 total files; 0 processed earlier; will process 317 files now Step #5: Running test ["seq", "67", "89", "22"] Step #5: === Compare result for: seq ["67", "89", "22"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "49.84499407895848", "93"] Step #5: === Compare result for: seq ["49.84499407895848", "93"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-4"] Step #5: === Compare result for: seq ["-4"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-11.474691832596974"] Step #5: === Compare result for: seq ["-11.474691832596974"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-67.21231186580417", "72.29495736689117"] Step #5: === Compare result for: seq ["-67.21231186580417", "72.29495736689117"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-53", "58.06567425093755"] Step #5: === Compare result for: seq ["-53", "58.06567425093755"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-21.85942868610576", "67", "-79"] Step #5: === Compare result for: seq ["-21.85942868610576", "67", "-79"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-45.04069276622084", "5", "1"] Step #5: === Compare result for: seq ["-45.04069276622084", "5", "1"] Step #5: === OK Same behavior Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-20.032833670645104", "5515", "5"] Step #5: === Compare result for: seq ["-20.032833670645104", "5515", "5"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "9422"] Step #5: === Compare result for: seq ["9422"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "520", "8643", "21"] Step #5: === Compare result for: seq ["520", "8643", "21"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "33", "-43.130197291732046", "92.26861597158097"] Step #5: === Compare result for: seq ["33", "-43.130197291732046", "92.26861597158097"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-1925", "-60.254382476046466"] Step #5: === Compare result for: seq ["-1925", "-60.254382476046466"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "75"] Step #5: === Compare result for: seq ["75"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "33.495903552612475", "-88"] Step #5: === Compare result for: seq ["33.495903552612475", "-88"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-9"] Step #5: === Compare result for: seq ["-9"] Step #5: === OK Same behavior Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-70.24386832701275"] Step #5: === Compare result for: seq ["-70.24386832701275"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "19.76784950942752", "-65", "-88.66879846681806"] Step #5: === Compare result for: seq ["19.76784950942752", "-65", "-88.66879846681806"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-3414"] Step #5: === Compare result for: seq ["-3414"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-5951", "77", "34"] Step #5: === Compare result for: seq ["-5951", "77", "34"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-96.23556936074836"] Step #5: === Compare result for: seq ["-96.23556936074836"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-82.1554417909434", "7062", "8851"] Step #5: === Compare result for: seq ["-82.1554417909434", "7062", "8851"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-45.314130694485314"] Step #5: === Compare result for: seq ["-45.314130694485314"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-49.781843809331015", "45.450732228962664", "90"] Step #5: === Compare result for: seq ["-49.781843809331015", "45.450732228962664", "90"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-86.81860538844303", "-24.028624459516436", "88.82004634756217"] Step #5: === Compare result for: seq ["-86.81860538844303", "-24.028624459516436", "88.82004634756217"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "u", "-23.2381677957365"] Step #5: === Compare result for: seq ["u", "-23.2381677957365"] Step #5: Rust stderr: Step #5: seq-error-parse Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: invalid floating point argument: 'u' Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-parse Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +invalid floating point argument: 'u' Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq ["u", "-23.2381677957365"] Step #5: Step #5: Running test ["seq", "1099", "-8"] Step #5: === Compare result for: seq ["1099", "-8"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-12.441972132939625", "-7821"] Step #5: === Compare result for: seq ["-12.441972132939625", "-7821"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "32", "-5564", "-6868"] Step #5: === Compare result for: seq ["32", "-5564", "-6868"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "12", "96", "3580"] Step #5: === Compare result for: seq ["12", "96", "3580"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-39.96557975401562"] Step #5: === Compare result for: seq ["-39.96557975401562"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-35.683187145418714", "-81"] Step #5: === Compare result for: seq ["-35.683187145418714", "-81"] Step #5: === OK Same behavior Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "7592", "2"] Step #5: === Compare result for: seq ["7592", "2"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "87", "-580"] Step #5: === Compare result for: seq ["87", "-580"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-79", "33", "12"] Step #5: === Compare result for: seq ["-79", "33", "12"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3259", "-975", "61"] Step #5: === Compare result for: seq ["3259", "-975", "61"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-53", "-3788", "-40.39133520997096"] Step #5: === Compare result for: seq ["-53", "-3788", "-40.39133520997096"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "53", "62", "1973"] Step #5: === Compare result for: seq ["53", "62", "1973"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "5947", "-4485", "1782"] Step #5: === Compare result for: seq ["5947", "-4485", "1782"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8251", "-93", "12"] Step #5: === Compare result for: seq ["-8251", "-93", "12"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-54", "-35"] Step #5: === Compare result for: seq ["-54", "-35"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-69", "-4948"] Step #5: === Compare result for: seq ["-69", "-4948"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3.011846742036454", "20"] Step #5: === Compare result for: seq ["3.011846742036454", "20"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-59.93776575138172"] Step #5: === Compare result for: seq ["-59.93776575138172"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "44.63223457927782", "9653"] Step #5: === Compare result for: seq ["44.63223457927782", "9653"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "96.01345022424019", "35.07753752980955"] Step #5: === Compare result for: seq ["96.01345022424019", "35.07753752980955"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "9637", "-43"] Step #5: === Compare result for: seq ["9637", "-43"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4781", "-31"] Step #5: === Compare result for: seq ["4781", "-31"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "9333", "-77", "89.04566433392333"] Step #5: === Compare result for: seq ["9333", "-77", "89.04566433392333"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "62", "-8", "100"] Step #5: === Compare result for: seq ["62", "-8", "100"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7", "-13"] Step #5: === Compare result for: seq ["-7", "-13"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "85.17233365361344"] Step #5: === Compare result for: seq ["85.17233365361344"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "98", "-89.50369456940601"] Step #5: === Compare result for: seq ["98", "-89.50369456940601"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "7"] Step #5: === Compare result for: seq ["7"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "9236", "86", "-1640"] Step #5: === Compare result for: seq ["9236", "86", "-1640"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-95"] Step #5: === Compare result for: seq ["-95"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4"] Step #5: === Compare result for: seq ["4"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-68"] Step #5: === Compare result for: seq ["-68"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "49.95023257608025", "-79"] Step #5: === Compare result for: seq ["49.95023257608025", "-79"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-9886", "955", "2513"] Step #5: === Compare result for: seq ["-9886", "955", "2513"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-3581", "34"] Step #5: === Compare result for: seq ["-3581", "34"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "5", "63", "-96"] Step #5: === Compare result for: seq ["5", "63", "-96"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "22", "-54", "34.44476723101971"] Step #5: === Compare result for: seq ["22", "-54", "34.44476723101971"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-62.78991892369001"] Step #5: === Compare result for: seq ["-62.78991892369001"] Step #5: === OK Same behavior Step #5: Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "25"] Step #5: === Compare result for: seq ["25"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-42", "4163"] Step #5: === Compare result for: seq ["-42", "4163"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "77", "-71", "14"] Step #5: === Compare result for: seq ["77", "-71", "14"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-26", "22.751980509591576", "31"] Step #5: === Compare result for: seq ["-26", "22.751980509591576", "31"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-5215"] Step #5: === Compare result for: seq ["-5215"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-65.94428318645993"] Step #5: === Compare result for: seq ["-65.94428318645993"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-11.178184454064152", "-2840"] Step #5: === Compare result for: seq ["-11.178184454064152", "-2840"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "54", "-2106", "R(JU"] Step #5: === Compare result for: seq ["54", "-2106", "R(JU"] Step #5: Rust stderr: Step #5: seq-error-parse Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: invalid floating point argument: 'R(JU' Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-parse Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +invalid floating point argument: 'R(JU' Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq ["54", "-2106", "R(JU"] Step #5: Step #5: Running test ["seq", "-5655"] Step #5: === Compare result for: seq ["-5655"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-68"] Step #5: === Compare result for: seq ["-68"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-4195", "61"] Step #5: === Compare result for: seq ["-4195", "61"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-86"] Step #5: === Compare result for: seq ["-86"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-50.689582934019924", "-40", "16.826014438751884"] Step #5: === Compare result for: seq ["-50.689582934019924", "-40", "16.826014438751884"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "63.789583530782636", "55"] Step #5: === Compare result for: seq ["63.789583530782636", "55"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-2280"] Step #5: === Compare result for: seq ["-2280"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "8164"] Step #5: === Compare result for: seq ["8164"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "24"] Step #5: === Compare result for: seq ["24"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7542", "-100"] Step #5: === Compare result for: seq ["-7542", "-100"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "29", "-7614"] Step #5: === Compare result for: seq ["29", "-7614"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "5094"] Step #5: === Compare result for: seq ["5094"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4968", "65"] Step #5: === Compare result for: seq ["4968", "65"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-64", "35.786347019509094"] Step #5: === Compare result for: seq ["-64", "35.786347019509094"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-24.631181653430147", "-52.72095369757728", "57.70481061103462"] Step #5: === Compare result for: seq ["-24.631181653430147", "-52.72095369757728", "57.70481061103462"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-75", "-12", "18"] Step #5: === Compare result for: seq ["-75", "-12", "18"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-17", "10.407202685918378", "-94"] Step #5: === Compare result for: seq ["-17", "10.407202685918378", "-94"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "72", "-1499", "52"] Step #5: === Compare result for: seq ["72", "-1499", "52"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7", "66", "-5788"] Step #5: === Compare result for: seq ["-7", "66", "-5788"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-28.1019503105679", "37", "-72.35977080981888"] Step #5: === Compare result for: seq ["-28.1019503105679", "37", "-72.35977080981888"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-93", "62"] Step #5: === Compare result for: seq ["-93", "62"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8299", "-71"] Step #5: === Compare result for: seq ["-8299", "-71"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "78"] Step #5: === Compare result for: seq ["78"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8234", "-26"] Step #5: === Compare result for: seq ["-8234", "-26"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3566", "-3489", "3889"] Step #5: === Compare result for: seq ["3566", "-3489", "3889"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-43"] Step #5: === Compare result for: seq ["-43"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-95", "61.00102459706736", "93"] Step #5: === Compare result for: seq ["-95", "61.00102459706736", "93"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-3542", "-94", "-68.1631690689363"] Step #5: === Compare result for: seq ["-3542", "-94", "-68.1631690689363"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "7.632733040968986"] Step #5: === Compare result for: seq ["7.632733040968986"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "26", "7442", "-3"] Step #5: === Compare result for: seq ["26", "7442", "-3"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "128", "-95", "77.56739388338224"] Step #5: === Compare result for: seq ["128", "-95", "77.56739388338224"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "35", "FGN(", "-72.89535339463522"] Step #5: === Compare result for: seq ["35", "FGN(", "-72.89535339463522"] Step #5: Rust stderr: Step #5: seq-error-parse Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: invalid floating point argument: 'FGN(' Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-parse Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +invalid floating point argument: 'FGN(' Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq ["35", "FGN(", "-72.89535339463522"] Step #5: Step #5: Running test ["seq", "-27"] Step #5: === Compare result for: seq ["-27"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "97.64836676580373", "-73", "4719"] Step #5: === Compare result for: seq ["97.64836676580373", "-73", "4719"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-23", "-4276"] Step #5: === Compare result for: seq ["-23", "-4276"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "8115", "9"] Step #5: === Compare result for: seq ["8115", "9"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-9070"] Step #5: === Compare result for: seq ["-9070"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "45.912882807520816", "45", "-2282"] Step #5: === Compare result for: seq ["45.912882807520816", "45", "-2282"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-43"] Step #5: === Compare result for: seq ["-43"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-2910"] Step #5: === Compare result for: seq ["-2910"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "1155", "62", "-69"] Step #5: === Compare result for: seq ["1155", "62", "-69"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-43.91278601039503"] Step #5: === Compare result for: seq ["-43.91278601039503"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-84.41260944249392", "-62"] Step #5: === Compare result for: seq ["-84.41260944249392", "-62"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-98", "84"] Step #5: === Compare result for: seq ["-98", "84"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-24.61056540318114"] Step #5: === Compare result for: seq ["-24.61056540318114"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-2", "68", "4846"] Step #5: === Compare result for: seq ["-2", "68", "4846"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "67", "-51.894448378281275", "2.239375541213249"] Step #5: === Compare result for: seq ["67", "-51.894448378281275", "2.239375541213249"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "94", "10", "-5845"] Step #5: === Compare result for: seq ["94", "10", "-5845"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "75.41627326823689", "-79", "-37"] Step #5: === Compare result for: seq ["75.41627326823689", "-79", "-37"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-5228"] Step #5: === Compare result for: seq ["-5228"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-81"] Step #5: === Compare result for: seq ["-81"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "45.201816160127436", "-28"] Step #5: === Compare result for: seq ["45.201816160127436", "-28"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "25.019445598410428", "-39", "42"] Step #5: === Compare result for: seq ["25.019445598410428", "-39", "42"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-1276", "3894"] Step #5: === Compare result for: seq ["-1276", "3894"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "52.0473821609078", "-42"] Step #5: === Compare result for: seq ["52.0473821609078", "-42"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-57", "83", "7314"] Step #5: === Compare result for: seq ["-57", "83", "7314"] Step #5: === OK Same behavior Step #5: Step #5: #128 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "49"] Step #5: === Compare result for: seq ["49"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-20", "-7733", "60"] Step #5: === Compare result for: seq ["-20", "-7733", "60"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "86", "84"] Step #5: === Compare result for: seq ["86", "84"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "90.71775427095167"] Step #5: === Compare result for: seq ["90.71775427095167"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "61", "-89", "50.795394233389715"] Step #5: === Compare result for: seq ["61", "-89", "50.795394233389715"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "2422"] Step #5: === Compare result for: seq ["2422"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-92", "-50", "-1501"] Step #5: === Compare result for: seq ["-92", "-50", "-1501"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "6519", "-58"] Step #5: === Compare result for: seq ["6519", "-58"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "2.3011378563284097", "-79"] Step #5: === Compare result for: seq ["2.3011378563284097", "-79"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "67.26062107689438"] Step #5: === Compare result for: seq ["67.26062107689438"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "70", "68", "-8806"] Step #5: === Compare result for: seq ["70", "68", "-8806"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4R", "90.07768018748487", "46"] Step #5: === Compare result for: seq ["4R", "90.07768018748487", "46"] Step #5: Rust stderr: Step #5: seq-error-parse Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: invalid floating point argument: '4R' Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-parse Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +invalid floating point argument: '4R' Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq ["4R", "90.07768018748487", "46"] Step #5: Step #5: Running test ["seq", "-66", "-13"] Step #5: === Compare result for: seq ["-66", "-13"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "23"] Step #5: === Compare result for: seq ["23"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-69", "-87", "75"] Step #5: === Compare result for: seq ["-69", "-87", "75"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-5768", "19.9582496817805", "-83"] Step #5: === Compare result for: seq ["-5768", "19.9582496817805", "-83"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-51.05958089688522", "-71.65961644865621"] Step #5: === Compare result for: seq ["-51.05958089688522", "-71.65961644865621"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "6353", "6.305679812410418"] Step #5: === Compare result for: seq ["6353", "6.305679812410418"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-5"] Step #5: === Compare result for: seq ["-5"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "16", "-5993"] Step #5: === Compare result for: seq ["16", "-5993"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-63"] Step #5: === Compare result for: seq ["-63"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-85", "82.38274770190239"] Step #5: === Compare result for: seq ["-85", "82.38274770190239"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "30", "94.71494093867597", "2485"] Step #5: === Compare result for: seq ["30", "94.71494093867597", "2485"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-635"] Step #5: === Compare result for: seq ["-635"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-52.75108413517593", "37"] Step #5: === Compare result for: seq ["-52.75108413517593", "37"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "55", "-72"] Step #5: === Compare result for: seq ["55", "-72"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "76", "40", "52.0138321892731"] Step #5: === Compare result for: seq ["76", "40", "52.0138321892731"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "75", "-54"] Step #5: === Compare result for: seq ["75", "-54"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "94.0438488657937", "-82"] Step #5: === Compare result for: seq ["94.0438488657937", "-82"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-87", "-43", "-2977"] Step #5: === Compare result for: seq ["-87", "-43", "-2977"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "100", "37", "-52"] Step #5: === Compare result for: seq ["100", "37", "-52"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "20", "-28", "63.23016455943855"] Step #5: === Compare result for: seq ["20", "-28", "63.23016455943855"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8290", "86", "-82"] Step #5: === Compare result for: seq ["-8290", "86", "-82"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-9368", "766", "6618"] Step #5: === Compare result for: seq ["-9368", "766", "6618"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-90", "37.08411487753244"] Step #5: === Compare result for: seq ["-90", "37.08411487753244"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-28.354419485876733", "-176"] Step #5: === Compare result for: seq ["-28.354419485876733", "-176"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-90"] Step #5: === Compare result for: seq ["-90"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "n(Ã", "4274"] Step #5: === Compare result for: seq ["n(Ã", "4274"] Step #5: Rust stderr: Step #5: seq-error-parse Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: invalid floating point argument: 'n(\303\203' Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-parse Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +invalid floating point argument: 'n(\303\203' Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq ["n(Ã", "4274"] Step #5: Step #5: Running test ["seq", "79", "-5814"] Step #5: === Compare result for: seq ["79", "-5814"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-16"] Step #5: === Compare result for: seq ["-16"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3627", "49", "-5"] Step #5: === Compare result for: seq ["3627", "49", "-5"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7755", "-9195"] Step #5: === Compare result for: seq ["-7755", "-9195"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "95"] Step #5: === Compare result for: seq ["95"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-91", "-9591", "69"] Step #5: === Compare result for: seq ["-91", "-9591", "69"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "1971", "98", "39"] Step #5: === Compare result for: seq ["1971", "98", "39"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8959", "12", "-91"] Step #5: === Compare result for: seq ["-8959", "12", "-91"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "88", "76", "-65"] Step #5: === Compare result for: seq ["88", "76", "-65"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4594", "-67"] Step #5: === Compare result for: seq ["4594", "-67"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-96.86142123789617", "-50.22780323539595", "87"] Step #5: === Compare result for: seq ["-96.86142123789617", "-50.22780323539595", "87"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-9173"] Step #5: === Compare result for: seq ["-9173"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "86", "3114"] Step #5: === Compare result for: seq ["86", "3114"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "71", "-43"] Step #5: === Compare result for: seq ["71", "-43"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-3816", "5843", "-56"] Step #5: === Compare result for: seq ["-3816", "5843", "-56"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7732"] Step #5: === Compare result for: seq ["-7732"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "61.03628176924397"] Step #5: === Compare result for: seq ["61.03628176924397"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-86", "24.26678505273196", "-22.06368825762111"] Step #5: === Compare result for: seq ["-86", "24.26678505273196", "-22.06368825762111"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "2831", "8840", "-60"] Step #5: === Compare result for: seq ["2831", "8840", "-60"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "92", "-82"] Step #5: === Compare result for: seq ["92", "-82"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "99"] Step #5: === Compare result for: seq ["99"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "47"] Step #5: === Compare result for: seq ["47"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-99", "1156"] Step #5: === Compare result for: seq ["-99", "1156"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4480", "6231"] Step #5: === Compare result for: seq ["4480", "6231"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "67", "-8618"] Step #5: === Compare result for: seq ["67", "-8618"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "8211", "-100"] Step #5: === Compare result for: seq ["8211", "-100"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7534", "89", "-54"] Step #5: === Compare result for: seq ["-7534", "89", "-54"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-50", "21.801053215424915", "9464"] Step #5: === Compare result for: seq ["-50", "21.801053215424915", "9464"] Step #5: Rust stdout: Step #5: -50.000000000000000 Step #5: -28.198946784575085 Step #5: -6.397893569150170 Step #5: 15.403159646274745 Step #5: 37.204212861699660 Step #5: 59.005266077124575 Step #5: 80.806319292549490 Step #5: 102.607372507974405 Step #5: 124.408425723399320 Step #5: 146.209478938824235 Step #5: 168.010532154249150 Step #5: 189.811585369674065 Step #5: 211.612638585098980 Step #5: 233.413691800523895 Step #5: 255.214745015948810 Step #5: 277.015798231373725 Step #5: 298.816851446798640 Step #5: 320.617904662223555 Step #5: 342.418957877648470 Step #5: 364.220011093073385 Step #5: 386.021064308498300 Step #5: 407.822117523923215 Step #5: 429.623170739348130 Step #5: 451.424223954773045 Step #5: 473.225277170197960 Step #5: 495.026330385622875 Step #5: 516.827383601047790 Step #5: 538.628436816472705 Step #5: 560.429490031897620 Step #5: 582.230543247322535 Step #5: 604.031596462747450 Step #5: 625.832649678172365 Step #5: 647.633702893597280 Step #5: 669.434756109022195 Step #5: 691.235809324447110 Step #5: 713.036862539872025 Step #5: 734.837915755296940 Step #5: 756.638968970721855 Step #5: 778.440022186146770 Step #5: 800.241075401571685 Step #5: 822.042128616996600 Step #5: 843.843181832421515 Step #5: 865.644235047846430 Step #5: 887.445288263271345 Step #5: 909.246341478696260 Step #5: 931.047394694121175 Step #5: 952.848447909546090 Step #5: 974.649501124971005 Step #5: 996.450554340395920 Step #5: 1018.251607555820835 Step #5: 1040.052660771245750 Step #5: 1061.853713986670665 Step #5: 1083.654767202095580 Step #5: 1105.455820417520495 Step #5: 1127.256873632945410 Step #5: 1149.057926848370325 Step #5: 1170.858980063795240 Step #5: 1192.660033279220155 Step #5: 1214.461086494645070 Step #5: 1236.262139710069985 Step #5: 1258.063192925494900 Step #5: 1279.864246140919815 Step #5: 1301.665299356344730 Step #5: 1323.466352571769645 Step #5: 1345.267405787194560 Step #5: 1367.068459002619475 Step #5: 1388.869512218044390 Step #5: 1410.670565433469305 Step #5: 1432.471618648894220 Step #5: 1454.272671864319135 Step #5: 1476.073725079744050 Step #5: 1497.874778295168965 Step #5: 1519.675831510593880 Step #5: 1541.476884726018795 Step #5: 1563.277937941443710 Step #5: 1585.078991156868625 Step #5: 1606.880044372293540 Step #5: 1628.681097587718455 Step #5: 1650.482150803143370 Step #5: 1672.283204018568285 Step #5: 1694.084257233993200 Step #5: 1715.885310449418115 Step #5: 1737.686363664843030 Step #5: 1759.487416880267945 Step #5: 1781.288470095692860 Step #5: 1803.089523311117775 Step #5: 1824.890576526542690 Step #5: 1846.691629741967605 Step #5: 1868.492682957392520 Step #5: 1890.293736172817435 Step #5: 1912.094789388242350 Step #5: 1933.895842603667265 Step #5: 1955.696895819092180 Step #5: 1977.497949034517095 Step #5: 1999.299002249942010 Step #5: 2021.100055465366925 Step #5: 2042.901108680791840 Step #5: 2064.702161896216755 Step #5: 2086.503215111641670 Step #5: 2108.304268327066585 Step #5: 2130.105321542491500 Step #5: 2151.906374757916415 Step #5: 2173.707427973341330 Step #5: 2195.508481188766245 Step #5: 2217.309534404191160 Step #5: 2239.110587619616075 Step #5: 2260.911640835040990 Step #5: 2282.712694050465905 Step #5: 2304.513747265890820 Step #5: 2326.314800481315735 Step #5: 2348.115853696740650 Step #5: 2369.916906912165565 Step #5: 2391.717960127590480 Step #5: 2413.519013343015395 Step #5: 2435.320066558440310 Step #5: 2457.121119773865225 Step #5: 2478.922172989290140 Step #5: 2500.723226204715055 Step #5: 2522.524279420139970 Step #5: 2544.325332635564885 Step #5: 2566.126385850989800 Step #5: 2587.927439066414715 Step #5: 2609.728492281839630 Step #5: 2631.529545497264545 Step #5: 2653.330598712689460 Step #5: 2675.131651928114375 Step #5: 2696.932705143539290 Step #5: 2718.733758358964205 Step #5: 2740.534811574389120 Step #5: 2762.335864789814035 Step #5: 2784.136918005238950 Step #5: 2805.937971220663865 Step #5: 2827.739024436088780 Step #5: 2849.540077651513695 Step #5: 2871.341130866938610 Step #5: 2893.142184082363525 Step #5: 2914.943237297788440 Step #5: 2936.744290513213355 Step #5: 2958.545343728638270 Step #5: 2980.346396944063185 Step #5: 3002.147450159488100 Step #5: 3023.948503374913015 Step #5: 3045.749556590337930 Step #5: 3067.550609805762845 Step #5: 3089.351663021187760 Step #5: 3111.152716236612675 Step #5: 3132.953769452037590 Step #5: 3154.754822667462505 Step #5: 3176.555875882887420 Step #5: 3198.356929098312335 Step #5: 3220.157982313737250 Step #5: 3241.959035529162165 Step #5: 3263.760088744587080 Step #5: 3285.561141960011995 Step #5: 3307.362195175436910 Step #5: 3329.163248390861825 Step #5: 3350.964301606286740 Step #5: 3372.765354821711655 Step #5: 3394.566408037136570 Step #5: 3416.367461252561485 Step #5: 3438.168514467986400 Step #5: 3459.969567683411315 Step #5: 3481.770620898836230 Step #5: 3503.571674114261145 Step #5: 3525.372727329686060 Step #5: 3547.173780545110975 Step #5: 3568.974833760535890 Step #5: 3590.775886975960805 Step #5: 3612.576940191385720 Step #5: 3634.377993406810635 Step #5: 3656.179046622235550 Step #5: 3677.980099837660465 Step #5: 3699.781153053085380 Step #5: 3721.582206268510295 Step #5: 3743.383259483935210 Step #5: 3765.184312699360125 Step #5: 3786.985365914785040 Step #5: 3808.786419130209955 Step #5: 3830.587472345634870 Step #5: 3852.388525561059785 Step #5: 3874.189578776484700 Step #5: 3895.990631991909615 Step #5: 3917.791685207334530 Step #5: 3939.592738422759445 Step #5: 3961.393791638184360 Step #5: 3983.194844853609275 Step #5: 4004.995898069034190 Step #5: 4026.796951284459105 Step #5: 4048.598004499884020 Step #5: 4070.399057715308935 Step #5: 4092.200110930733850 Step #5: 4114.001164146158765 Step #5: 4135.802217361583680 Step #5: 4157.603270577008595 Step #5: 4179.404323792433510 Step #5: 4201.205377007858425 Step #5: 4223.006430223283340 Step #5: 4244.807483438708255 Step #5: 4266.608536654133170 Step #5: 4288.409589869558085 Step #5: 4310.210643084983000 Step #5: 4332.011696300407915 Step #5: 4353.812749515832830 Step #5: 4375.613802731257745 Step #5: 4397.414855946682660 Step #5: 4419.215909162107575 Step #5: 4441.016962377532490 Step #5: 4462.818015592957405 Step #5: 4484.619068808382320 Step #5: 4506.420122023807235 Step #5: 4528.221175239232150 Step #5: 4550.022228454657065 Step #5: 4571.823281670081980 Step #5: 4593.624334885506895 Step #5: 4615.425388100931810 Step #5: 4637.226441316356725 Step #5: 4659.027494531781640 Step #5: 4680.828547747206555 Step #5: 4702.629600962631470 Step #5: 4724.430654178056385 Step #5: 4746.231707393481300 Step #5: 4768.032760608906215 Step #5: 4789.833813824331130 Step #5: 4811.634867039756045 Step #5: 4833.435920255180960 Step #5: 4855.236973470605875 Step #5: 4877.038026686030790 Step #5: 4898.839079901455705 Step #5: 4920.640133116880620 Step #5: 4942.441186332305535 Step #5: 4964.242239547730450 Step #5: 4986.043292763155365 Step #5: 5007.844345978580280 Step #5: 5029.645399194005195 Step #5: 5051.446452409430110 Step #5: 5073.247505624855025 Step #5: 5095.048558840279940 Step #5: 5116.849612055704855 Step #5: 5138.650665271129770 Step #5: 5160.451718486554685 Step #5: 5182.252771701979600 Step #5: 5204.053824917404515 Step #5: 5225.854878132829430 Step #5: 5247.655931348254345 Step #5: 5269.456984563679260 Step #5: 5291.258037779104175 Step #5: 5313.059090994529090 Step #5: 5334.860144209954005 Step #5: 5356.661197425378920 Step #5: 5378.462250640803835 Step #5: 5400.263303856228750 Step #5: 5422.064357071653665 Step #5: 5443.865410287078580 Step #5: 5465.666463502503495 Step #5: 5487.467516717928410 Step #5: 5509.268569933353325 Step #5: 5531.069623148778240 Step #5: 5552.870676364203155 Step #5: 5574.671729579628070 Step #5: 5596.472782795052985 Step #5: 5618.273836010477900 Step #5: 5640.074889225902815 Step #5: 5661.875942441327730 Step #5: 5683.676995656752645 Step #5: 5705.478048872177560 Step #5: 5727.279102087602475 Step #5: 5749.080155303027390 Step #5: 5770.881208518452305 Step #5: 5792.682261733877220 Step #5: 5814.483314949302135 Step #5: 5836.284368164727050 Step #5: 5858.085421380151965 Step #5: 5879.886474595576880 Step #5: 5901.687527811001795 Step #5: 5923.488581026426710 Step #5: 5945.289634241851625 Step #5: 5967.090687457276540 Step #5: 5988.891740672701455 Step #5: 6010.692793888126370 Step #5: 6032.493847103551285 Step #5: 6054.294900318976200 Step #5: 6076.095953534401115 Step #5: 6097.897006749826030 Step #5: 6119.698059965250945 Step #5: 6141.499113180675860 Step #5: 6163.300166396100775 Step #5: 6185.101219611525690 Step #5: 6206.902272826950605 Step #5: 6228.703326042375520 Step #5: 6250.504379257800435 Step #5: 6272.305432473225350 Step #5: 6294.106485688650265 Step #5: 6315.907538904075180 Step #5: 6337.708592119500095 Step #5: 6359.509645334925010 Step #5: 6381.310698550349925 Step #5: 6403.111751765774840 Step #5: 6424.912804981199755 Step #5: 6446.713858196624670 Step #5: 6468.514911412049585 Step #5: 6490.315964627474500 Step #5: 6512.117017842899415 Step #5: 6533.918071058324330 Step #5: 6555.719124273749245 Step #5: 6577.520177489174160 Step #5: 6599.321230704599075 Step #5: 6621.122283920023990 Step #5: 6642.923337135448905 Step #5: 6664.724390350873820 Step #5: 6686.525443566298735 Step #5: 6708.326496781723650 Step #5: 6730.127549997148565 Step #5: 6751.928603212573480 Step #5: 6773.729656427998395 Step #5: 6795.530709643423310 Step #5: 6817.331762858848225 Step #5: 6839.132816074273140 Step #5: 6860.933869289698055 Step #5: 6882.734922505122970 Step #5: 6904.535975720547885 Step #5: 6926.337028935972800 Step #5: 6948.138082151397715 Step #5: 6969.939135366822630 Step #5: 6991.740188582247545 Step #5: 7013.541241797672460 Step #5: 7035.342295013097375 Step #5: 7057.143348228522290 Step #5: 7078.944401443947205 Step #5: 7100.745454659372120 Step #5: 7122.546507874797035 Step #5: 7144.347561090221950 Step #5: 7166.148614305646865 Step #5: 7187.949667521071780 Step #5: 7209.750720736496695 Step #5: 7231.551773951921610 Step #5: 7253.352827167346525 Step #5: 7275.153880382771440 Step #5: 7296.954933598196355 Step #5: 7318.755986813621270 Step #5: 7340.557040029046185 Step #5: 7362.358093244471100 Step #5: 7384.159146459896015 Step #5: 7405.960199675320930 Step #5: 7427.761252890745845 Step #5: 7449.562306106170760 Step #5: 7471.363359321595675 Step #5: 7493.164412537020590 Step #5: 7514.965465752445505 Step #5: 7536.766518967870420 Step #5: 7558.567572183295335 Step #5: 7580.368625398720250 Step #5: 7602.169678614145165 Step #5: 7623.970731829570080 Step #5: 7645.771785044994995 Step #5: 7667.572838260419910 Step #5: 7689.373891475844825 Step #5: 7711.174944691269740 Step #5: 7732.975997906694655 Step #5: 7754.777051122119570 Step #5: 7776.578104337544485 Step #5: 7798.379157552969400 Step #5: 7820.180210768394315 Step #5: 7841.981263983819230 Step #5: 7863.782317199244145 Step #5: 7885.583370414669060 Step #5: 7907.384423630093975 Step #5: 7929.185476845518890 Step #5: 7950.986530060943805 Step #5: 7972.787583276368720 Step #5: 7994.588636491793635 Step #5: 8016.389689707218550 Step #5: 8038.190742922643465 Step #5: 8059.991796138068380 Step #5: 8081.792849353493295 Step #5: 8103.593902568918210 Step #5: 8125.394955784343125 Step #5: 8147.196008999768040 Step #5: 8168.997062215192955 Step #5: 8190.798115430617870 Step #5: 8212.599168646042785 Step #5: 8234.400221861467700 Step #5: 8256.201275076892615 Step #5: 8278.002328292317530 Step #5: 8299.803381507742445 Step #5: 8321.604434723167360 Step #5: 8343.405487938592275 Step #5: 8365.206541154017190 Step #5: 8387.007594369442105 Step #5: 8408.808647584867020 Step #5: 8430.609700800291935 Step #5: 8452.410754015716850 Step #5: 8474.211807231141765 Step #5: 8496.012860446566680 Step #5: 8517.813913661991595 Step #5: 8539.614966877416510 Step #5: 8561.416020092841425 Step #5: 8583.217073308266340 Step #5: 8605.018126523691255 Step #5: 8626.819179739116170 Step #5: 8648.620232954541085 Step #5: 8670.421286169966000 Step #5: 8692.222339385390915 Step #5: 8714.023392600815830 Step #5: 8735.824445816240745 Step #5: 8757.625499031665660 Step #5: 8779.426552247090575 Step #5: 8801.227605462515490 Step #5: 8823.028658677940405 Step #5: 8844.829711893365320 Step #5: 8866.630765108790235 Step #5: 8888.431818324215150 Step #5: 8910.232871539640065 Step #5: 8932.033924755064980 Step #5: 8953.834977970489895 Step #5: 8975.636031185914810 Step #5: 8997.437084401339725 Step #5: 9019.238137616764640 Step #5: 9041.039190832189555 Step #5: 9062.840244047614470 Step #5: 9084.641297263039385 Step #5: 9106.442350478464300 Step #5: 9128.243403693889215 Step #5: 9150.044456909314130 Step #5: 9171.845510124739045 Step #5: 9193.646563340163960 Step #5: 9215.447616555588875 Step #5: 9237.248669771013790 Step #5: 9259.049722986438705 Step #5: 9280.850776201863620 Step #5: 9302.651829417288535 Step #5: 9324.452882632713450 Step #5: 9346.253935848138365 Step #5: 9368.054989063563280 Step #5: 9389.856042278988195 Step #5: 9411.657095494413110 Step #5: 9433.458148709838025 Step #5: 9455.259201925262940 Step #5: Step #5: GNU stdout: Step #5: -50.000000000000000 Step #5: -28.198946784575085 Step #5: -6.397893569150170 Step #5: 15.403159646274745 Step #5: 37.204212861699660 Step #5: 59.005266077124575 Step #5: 80.806319292549490 Step #5: 102.607372507974405 Step #5: 124.408425723399320 Step #5: 146.209478938824235 Step #5: 168.010532154249150 Step #5: 189.811585369674065 Step #5: 211.612638585098980 Step #5: 233.413691800523895 Step #5: 255.214745015948810 Step #5: 277.015798231373725 Step #5: 298.816851446798640 Step #5: 320.617904662223555 Step #5: 342.418957877648470 Step #5: 364.220011093073385 Step #5: 386.021064308498300 Step #5: 407.822117523923215 Step #5: 429.623170739348130 Step #5: 451.424223954773045 Step #5: 473.225277170197960 Step #5: 495.026330385622875 Step #5: 516.827383601047790 Step #5: 538.628436816472705 Step #5: 560.429490031897620 Step #5: 582.230543247322535 Step #5: 604.031596462747450 Step #5: 625.832649678172365 Step #5: 647.633702893597280 Step #5: 669.434756109022195 Step #5: 691.235809324447110 Step #5: 713.036862539872025 Step #5: 734.837915755296940 Step #5: 756.638968970721855 Step #5: 778.440022186146770 Step #5: 800.241075401571685 Step #5: 822.042128616996600 Step #5: 843.843181832421515 Step #5: 865.644235047846430 Step #5: 887.445288263271345 Step #5: 909.246341478696260 Step #5: 931.047394694121175 Step #5: 952.848447909546090 Step #5: 974.649501124971005 Step #5: 996.450554340395920 Step #5: 1018.251607555820835 Step #5: 1040.052660771245750 Step #5: 1061.853713986670665 Step #5: 1083.654767202095580 Step #5: 1105.455820417520495 Step #5: 1127.256873632945410 Step #5: 1149.057926848370325 Step #5: 1170.858980063795240 Step #5: 1192.660033279220155 Step #5: 1214.461086494645070 Step #5: 1236.262139710069985 Step #5: 1258.063192925494900 Step #5: 1279.864246140919815 Step #5: 1301.665299356344730 Step #5: 1323.466352571769645 Step #5: 1345.267405787194560 Step #5: 1367.068459002619475 Step #5: 1388.869512218044390 Step #5: 1410.670565433469305 Step #5: 1432.471618648894220 Step #5: 1454.272671864319135 Step #5: 1476.073725079744050 Step #5: 1497.874778295168965 Step #5: 1519.675831510593880 Step #5: 1541.476884726018795 Step #5: 1563.277937941443710 Step #5: 1585.078991156868625 Step #5: 1606.880044372293540 Step #5: 1628.681097587718455 Step #5: 1650.482150803143370 Step #5: 1672.283204018568285 Step #5: 1694.084257233993200 Step #5: 1715.885310449418115 Step #5: 1737.686363664843030 Step #5: 1759.487416880267945 Step #5: 1781.288470095692860 Step #5: 1803.089523311117775 Step #5: 1824.890576526542690 Step #5: 1846.691629741967605 Step #5: 1868.492682957392520 Step #5: 1890.293736172817435 Step #5: 1912.094789388242350 Step #5: 1933.895842603667265 Step #5: 1955.696895819092180 Step #5: 1977.497949034517095 Step #5: 1999.299002249942010 Step #5: 2021.100055465366925 Step #5: 2042.901108680791840 Step #5: 2064.702161896216755 Step #5: 2086.503215111641670 Step #5: 2108.304268327066585 Step #5: 2130.105321542491500 Step #5: 2151.906374757916415 Step #5: 2173.707427973341330 Step #5: 2195.508481188766245 Step #5: 2217.309534404191160 Step #5: 2239.110587619616075 Step #5: 2260.911640835040990 Step #5: 2282.712694050465905 Step #5: 2304.513747265890820 Step #5: 2326.314800481315735 Step #5: 2348.115853696740650 Step #5: 2369.916906912165565 Step #5: 2391.717960127590480 Step #5: 2413.519013343015395 Step #5: 2435.320066558440310 Step #5: 2457.121119773865225 Step #5: 2478.922172989290140 Step #5: 2500.723226204715055 Step #5: 2522.524279420139970 Step #5: 2544.325332635564885 Step #5: 2566.126385850989800 Step #5: 2587.927439066414715 Step #5: 2609.728492281839630 Step #5: 2631.529545497264545 Step #5: 2653.330598712689460 Step #5: 2675.131651928114375 Step #5: 2696.932705143539290 Step #5: 2718.733758358964205 Step #5: 2740.534811574389120 Step #5: 2762.335864789814035 Step #5: 2784.136918005238950 Step #5: 2805.937971220663865 Step #5: 2827.739024436088780 Step #5: 2849.540077651513695 Step #5: 2871.341130866938610 Step #5: 2893.142184082363525 Step #5: 2914.943237297788440 Step #5: 2936.744290513213355 Step #5: 2958.545343728638270 Step #5: 2980.346396944063185 Step #5: 3002.147450159488100 Step #5: 3023.948503374913015 Step #5: 3045.749556590337930 Step #5: 3067.550609805762845 Step #5: 3089.351663021187760 Step #5: 3111.152716236612675 Step #5: 3132.953769452037590 Step #5: 3154.754822667462505 Step #5: 3176.555875882887420 Step #5: 3198.356929098312335 Step #5: 3220.157982313737250 Step #5: 3241.959035529162165 Step #5: 3263.760088744587080 Step #5: 3285.561141960011995 Step #5: 3307.362195175436910 Step #5: 3329.163248390861825 Step #5: 3350.964301606286740 Step #5: 3372.765354821711655 Step #5: 3394.566408037136570 Step #5: 3416.367461252561485 Step #5: 3438.168514467986400 Step #5: 3459.969567683411315 Step #5: 3481.770620898836230 Step #5: 3503.571674114261145 Step #5: 3525.372727329686060 Step #5: 3547.173780545110975 Step #5: 3568.974833760535890 Step #5: 3590.775886975960805 Step #5: 3612.576940191385720 Step #5: 3634.377993406810635 Step #5: 3656.179046622235550 Step #5: 3677.980099837660465 Step #5: 3699.781153053085380 Step #5: 3721.582206268510295 Step #5: 3743.383259483935210 Step #5: 3765.184312699360125 Step #5: 3786.985365914785040 Step #5: 3808.786419130209955 Step #5: 3830.587472345634870 Step #5: 3852.388525561059785 Step #5: 3874.189578776484700 Step #5: 3895.990631991909615 Step #5: 3917.791685207334530 Step #5: 3939.592738422759445 Step #5: 3961.393791638184360 Step #5: 3983.194844853609275 Step #5: 4004.995898069034190 Step #5: 4026.796951284459105 Step #5: 4048.598004499884020 Step #5: 4070.399057715308935 Step #5: 4092.200110930733850 Step #5: 4114.001164146158765 Step #5: 4135.802217361583680 Step #5: 4157.603270577008595 Step #5: 4179.404323792433510 Step #5: 4201.205377007858425 Step #5: 4223.006430223283340 Step #5: 4244.807483438708255 Step #5: 4266.608536654133170 Step #5: 4288.409589869558085 Step #5: 4310.210643084983000 Step #5: 4332.011696300407915 Step #5: 4353.812749515832830 Step #5: 4375.613802731257745 Step #5: 4397.414855946682660 Step #5: 4419.215909162107575 Step #5: 4441.016962377532490 Step #5: 4462.818015592957405 Step #5: 4484.619068808382320 Step #5: 4506.420122023807235 Step #5: 4528.221175239232150 Step #5: 4550.022228454657065 Step #5: 4571.823281670081980 Step #5: 4593.624334885506895 Step #5: 4615.425388100931810 Step #5: 4637.226441316356725 Step #5: 4659.027494531781640 Step #5: 4680.828547747206555 Step #5: 4702.629600962631470 Step #5: 4724.430654178056385 Step #5: 4746.231707393481300 Step #5: 4768.032760608906215 Step #5: 4789.833813824331130 Step #5: 4811.634867039756045 Step #5: 4833.435920255180960 Step #5: 4855.236973470605875 Step #5: 4877.038026686030790 Step #5: 4898.839079901455705 Step #5: 4920.640133116880620 Step #5: 4942.441186332305535 Step #5: 4964.242239547730450 Step #5: 4986.043292763155365 Step #5: 5007.844345978580280 Step #5: 5029.645399194005195 Step #5: 5051.446452409430110 Step #5: 5073.247505624855025 Step #5: 5095.048558840279940 Step #5: 5116.849612055704855 Step #5: 5138.650665271129770 Step #5: 5160.451718486554685 Step #5: 5182.252771701979600 Step #5: 5204.053824917404515 Step #5: 5225.854878132829430 Step #5: 5247.655931348254345 Step #5: 5269.456984563679260 Step #5: 5291.258037779104175 Step #5: 5313.059090994529090 Step #5: 5334.860144209954005 Step #5: 5356.661197425378920 Step #5: 5378.462250640803835 Step #5: 5400.263303856228750 Step #5: 5422.064357071653665 Step #5: 5443.865410287078580 Step #5: 5465.666463502503495 Step #5: 5487.467516717928410 Step #5: 5509.268569933353325 Step #5: 5531.069623148778240 Step #5: 5552.870676364203155 Step #5: 5574.671729579628070 Step #5: 5596.472782795052985 Step #5: 5618.273836010477900 Step #5: 5640.074889225902815 Step #5: 5661.875942441327730 Step #5: 5683.676995656752645 Step #5: 5705.478048872177560 Step #5: 5727.279102087602475 Step #5: 5749.080155303027390 Step #5: 5770.881208518452305 Step #5: 5792.682261733877220 Step #5: 5814.483314949302135 Step #5: 5836.284368164727050 Step #5: 5858.085421380151965 Step #5: 5879.886474595576880 Step #5: 5901.687527811001795 Step #5: 5923.488581026426710 Step #5: 5945.289634241851625 Step #5: 5967.090687457276540 Step #5: 5988.891740672701455 Step #5: 6010.692793888126370 Step #5: 6032.493847103551285 Step #5: 6054.294900318976200 Step #5: 6076.095953534401115 Step #5: 6097.897006749826030 Step #5: 6119.698059965250945 Step #5: 6141.499113180675860 Step #5: 6163.300166396100775 Step #5: 6185.101219611525690 Step #5: 6206.902272826950605 Step #5: 6228.703326042375520 Step #5: 6250.504379257800435 Step #5: 6272.305432473225350 Step #5: 6294.106485688650265 Step #5: 6315.907538904075180 Step #5: 6337.708592119500095 Step #5: 6359.509645334925010 Step #5: 6381.310698550349925 Step #5: 6403.111751765774840 Step #5: 6424.912804981199755 Step #5: 6446.713858196624670 Step #5: 6468.514911412049585 Step #5: 6490.315964627474500 Step #5: 6512.117017842899415 Step #5: 6533.918071058324330 Step #5: 6555.719124273749245 Step #5: 6577.520177489174160 Step #5: 6599.321230704599075 Step #5: 6621.122283920023990 Step #5: 6642.923337135448905 Step #5: 6664.724390350873820 Step #5: 6686.525443566298735 Step #5: 6708.326496781723650 Step #5: 6730.127549997148565 Step #5: 6751.928603212573480 Step #5: 6773.729656427998395 Step #5: 6795.530709643423310 Step #5: 6817.331762858848225 Step #5: 6839.132816074273140 Step #5: 6860.933869289698055 Step #5: 6882.734922505122970 Step #5: 6904.535975720547885 Step #5: 6926.337028935972800 Step #5: 6948.138082151397715 Step #5: 6969.939135366822630 Step #5: 6991.740188582247545 Step #5: 7013.541241797672460 Step #5: 7035.342295013097375 Step #5: 7057.143348228522290 Step #5: 7078.944401443947205 Step #5: 7100.745454659372120 Step #5: 7122.546507874797035 Step #5: 7144.347561090221950 Step #5: 7166.148614305646865 Step #5: 7187.949667521071780 Step #5: 7209.750720736496695 Step #5: 7231.551773951921610 Step #5: 7253.352827167346525 Step #5: 7275.153880382771440 Step #5: 7296.954933598196355 Step #5: 7318.755986813621270 Step #5: 7340.557040029046185 Step #5: 7362.358093244471100 Step #5: 7384.159146459896015 Step #5: 7405.960199675320930 Step #5: 7427.761252890745845 Step #5: 7449.562306106170760 Step #5: 7471.363359321595675 Step #5: 7493.164412537020590 Step #5: 7514.965465752445505 Step #5: 7536.766518967870420 Step #5: 7558.567572183295335 Step #5: 7580.368625398720250 Step #5: 7602.169678614145165 Step #5: 7623.970731829570080 Step #5: 7645.771785044994995 Step #5: 7667.572838260419910 Step #5: 7689.373891475844825 Step #5: 7711.174944691269740 Step #5: 7732.975997906694655 Step #5: 7754.777051122119570 Step #5: 7776.578104337544485 Step #5: 7798.379157552969400 Step #5: 7820.180210768394315 Step #5: 7841.981263983819230 Step #5: 7863.782317199244145 Step #5: 7885.583370414669060 Step #5: 7907.384423630093975 Step #5: 7929.185476845518890 Step #5: 7950.986530060943805 Step #5: 7972.787583276368720 Step #5: 7994.588636491793635 Step #5: 8016.389689707218550 Step #5: 8038.190742922643465 Step #5: 8059.991796138068380 Step #5: 8081.792849353493295 Step #5: 8103.593902568918210 Step #5: 8125.394955784343125 Step #5: 8147.196008999768040 Step #5: 8168.997062215192955 Step #5: 8190.798115430617869 Step #5: 8212.599168646042785 Step #5: 8234.400221861467700 Step #5: 8256.201275076892615 Step #5: 8278.002328292317530 Step #5: 8299.803381507742445 Step #5: 8321.604434723167360 Step #5: 8343.405487938592275 Step #5: 8365.206541154017190 Step #5: 8387.007594369442105 Step #5: 8408.808647584867020 Step #5: 8430.609700800291935 Step #5: 8452.410754015716850 Step #5: 8474.211807231141765 Step #5: 8496.012860446566680 Step #5: 8517.813913661991595 Step #5: 8539.614966877416510 Step #5: 8561.416020092841425 Step #5: 8583.217073308266340 Step #5: 8605.018126523691255 Step #5: 8626.819179739116170 Step #5: 8648.620232954541085 Step #5: 8670.421286169966000 Step #5: 8692.222339385390915 Step #5: 8714.023392600815830 Step #5: 8735.824445816240745 Step #5: 8757.625499031665660 Step #5: 8779.426552247090575 Step #5: 8801.227605462515490 Step #5: 8823.028658677940405 Step #5: 8844.829711893365320 Step #5: 8866.630765108790235 Step #5: 8888.431818324215150 Step #5: 8910.232871539640064 Step #5: 8932.033924755064980 Step #5: 8953.834977970489895 Step #5: 8975.636031185914810 Step #5: 8997.437084401339725 Step #5: 9019.238137616764640 Step #5: 9041.039190832189555 Step #5: 9062.840244047614470 Step #5: 9084.641297263039385 Step #5: 9106.442350478464300 Step #5: 9128.243403693889215 Step #5: 9150.044456909314130 Step #5: 9171.845510124739045 Step #5: 9193.646563340163960 Step #5: 9215.447616555588874 Step #5: 9237.248669771013790 Step #5: 9259.049722986438705 Step #5: 9280.850776201863620 Step #5: 9302.651829417288535 Step #5: 9324.452882632713450 Step #5: 9346.253935848138365 Step #5: 9368.054989063563280 Step #5: 9389.856042278988195 Step #5: 9411.657095494413110 Step #5: 9433.458148709838025 Step #5: 9455.259201925262940 Step #5: Step #5: --- START diff Step #5: -50.000000000000000 Step #5: -28.198946784575085 Step #5: -6.397893569150170 Step #5: 15.403159646274745 Step #5: 37.204212861699660 Step #5: 59.005266077124575 Step #5: 80.806319292549490 Step #5: 102.607372507974405 Step #5: 124.408425723399320 Step #5: 146.209478938824235 Step #5: 168.010532154249150 Step #5: 189.811585369674065 Step #5: 211.612638585098980 Step #5: 233.413691800523895 Step #5: 255.214745015948810 Step #5: 277.015798231373725 Step #5: 298.816851446798640 Step #5: 320.617904662223555 Step #5: 342.418957877648470 Step #5: 364.220011093073385 Step #5: 386.021064308498300 Step #5: 407.822117523923215 Step #5: 429.623170739348130 Step #5: 451.424223954773045 Step #5: 473.225277170197960 Step #5: 495.026330385622875 Step #5: 516.827383601047790 Step #5: 538.628436816472705 Step #5: 560.429490031897620 Step #5: 582.230543247322535 Step #5: 604.031596462747450 Step #5: 625.832649678172365 Step #5: 647.633702893597280 Step #5: 669.434756109022195 Step #5: 691.235809324447110 Step #5: 713.036862539872025 Step #5: 734.837915755296940 Step #5: 756.638968970721855 Step #5: 778.440022186146770 Step #5: 800.241075401571685 Step #5: 822.042128616996600 Step #5: 843.843181832421515 Step #5: 865.644235047846430 Step #5: 887.445288263271345 Step #5: 909.246341478696260 Step #5: 931.047394694121175 Step #5: 952.848447909546090 Step #5: 974.649501124971005 Step #5: 996.450554340395920 Step #5: 1018.251607555820835 Step #5: 1040.052660771245750 Step #5: 1061.853713986670665 Step #5: 1083.654767202095580 Step #5: 1105.455820417520495 Step #5: 1127.256873632945410 Step #5: 1149.057926848370325 Step #5: 1170.858980063795240 Step #5: 1192.660033279220155 Step #5: 1214.461086494645070 Step #5: 1236.262139710069985 Step #5: 1258.063192925494900 Step #5: 1279.864246140919815 Step #5: 1301.665299356344730 Step #5: 1323.466352571769645 Step #5: 1345.267405787194560 Step #5: 1367.068459002619475 Step #5: 1388.869512218044390 Step #5: 1410.670565433469305 Step #5: 1432.471618648894220 Step #5: 1454.272671864319135 Step #5: 1476.073725079744050 Step #5: 1497.874778295168965 Step #5: 1519.675831510593880 Step #5: 1541.476884726018795 Step #5: 1563.277937941443710 Step #5: 1585.078991156868625 Step #5: 1606.880044372293540 Step #5: 1628.681097587718455 Step #5: 1650.482150803143370 Step #5: 1672.283204018568285 Step #5: 1694.084257233993200 Step #5: 1715.885310449418115 Step #5: 1737.686363664843030 Step #5: 1759.487416880267945 Step #5: 1781.288470095692860 Step #5: 1803.089523311117775 Step #5: 1824.890576526542690 Step #5: 1846.691629741967605 Step #5: 1868.492682957392520 Step #5: 1890.293736172817435 Step #5: 1912.094789388242350 Step #5: 1933.895842603667265 Step #5: 1955.696895819092180 Step #5: 1977.497949034517095 Step #5: 1999.299002249942010 Step #5: 2021.100055465366925 Step #5: 2042.901108680791840 Step #5: 2064.702161896216755 Step #5: 2086.503215111641670 Step #5: 2108.304268327066585 Step #5: 2130.105321542491500 Step #5: 2151.906374757916415 Step #5: 2173.707427973341330 Step #5: 2195.508481188766245 Step #5: 2217.309534404191160 Step #5: 2239.110587619616075 Step #5: 2260.911640835040990 Step #5: 2282.712694050465905 Step #5: 2304.513747265890820 Step #5: 2326.314800481315735 Step #5: 2348.115853696740650 Step #5: 2369.916906912165565 Step #5: 2391.717960127590480 Step #5: 2413.519013343015395 Step #5: 2435.320066558440310 Step #5: 2457.121119773865225 Step #5: 2478.922172989290140 Step #5: 2500.723226204715055 Step #5: 2522.524279420139970 Step #5: 2544.325332635564885 Step #5: 2566.126385850989800 Step #5: 2587.927439066414715 Step #5: 2609.728492281839630 Step #5: 2631.529545497264545 Step #5: 2653.330598712689460 Step #5: 2675.131651928114375 Step #5: 2696.932705143539290 Step #5: 2718.733758358964205 Step #5: 2740.534811574389120 Step #5: 2762.335864789814035 Step #5: 2784.136918005238950 Step #5: 2805.937971220663865 Step #5: 2827.739024436088780 Step #5: 2849.540077651513695 Step #5: 2871.341130866938610 Step #5: 2893.142184082363525 Step #5: 2914.943237297788440 Step #5: 2936.744290513213355 Step #5: 2958.545343728638270 Step #5: 2980.346396944063185 Step #5: 3002.147450159488100 Step #5: 3023.948503374913015 Step #5: 3045.749556590337930 Step #5: 3067.550609805762845 Step #5: 3089.351663021187760 Step #5: 3111.152716236612675 Step #5: 3132.953769452037590 Step #5: 3154.754822667462505 Step #5: 3176.555875882887420 Step #5: 3198.356929098312335 Step #5: 3220.157982313737250 Step #5: 3241.959035529162165 Step #5: 3263.760088744587080 Step #5: 3285.561141960011995 Step #5: 3307.362195175436910 Step #5: 3329.163248390861825 Step #5: 3350.964301606286740 Step #5: 3372.765354821711655 Step #5: 3394.566408037136570 Step #5: 3416.367461252561485 Step #5: 3438.168514467986400 Step #5: 3459.969567683411315 Step #5: 3481.770620898836230 Step #5: 3503.571674114261145 Step #5: 3525.372727329686060 Step #5: 3547.173780545110975 Step #5: 3568.974833760535890 Step #5: 3590.775886975960805 Step #5: 3612.576940191385720 Step #5: 3634.377993406810635 Step #5: 3656.179046622235550 Step #5: 3677.980099837660465 Step #5: 3699.781153053085380 Step #5: 3721.582206268510295 Step #5: 3743.383259483935210 Step #5: 3765.184312699360125 Step #5: 3786.985365914785040 Step #5: 3808.786419130209955 Step #5: 3830.587472345634870 Step #5: 3852.388525561059785 Step #5: 3874.189578776484700 Step #5: 3895.990631991909615 Step #5: 3917.791685207334530 Step #5: 3939.592738422759445 Step #5: 3961.393791638184360 Step #5: 3983.194844853609275 Step #5: 4004.995898069034190 Step #5: 4026.796951284459105 Step #5: 4048.598004499884020 Step #5: 4070.399057715308935 Step #5: 4092.200110930733850 Step #5: 4114.001164146158765 Step #5: 4135.802217361583680 Step #5: 4157.603270577008595 Step #5: 4179.404323792433510 Step #5: 4201.205377007858425 Step #5: 4223.006430223283340 Step #5: 4244.807483438708255 Step #5: 4266.608536654133170 Step #5: 4288.409589869558085 Step #5: 4310.210643084983000 Step #5: 4332.011696300407915 Step #5: 4353.812749515832830 Step #5: 4375.613802731257745 Step #5: 4397.414855946682660 Step #5: 4419.215909162107575 Step #5: 4441.016962377532490 Step #5: 4462.818015592957405 Step #5: 4484.619068808382320 Step #5: 4506.420122023807235 Step #5: 4528.221175239232150 Step #5: 4550.022228454657065 Step #5: 4571.823281670081980 Step #5: 4593.624334885506895 Step #5: 4615.425388100931810 Step #5: 4637.226441316356725 Step #5: 4659.027494531781640 Step #5: 4680.828547747206555 Step #5: 4702.629600962631470 Step #5: 4724.430654178056385 Step #5: 4746.231707393481300 Step #5: 4768.032760608906215 Step #5: 4789.833813824331130 Step #5: 4811.634867039756045 Step #5: 4833.435920255180960 Step #5: 4855.236973470605875 Step #5: 4877.038026686030790 Step #5: 4898.839079901455705 Step #5: 4920.640133116880620 Step #5: 4942.441186332305535 Step #5: 4964.242239547730450 Step #5: 4986.043292763155365 Step #5: 5007.844345978580280 Step #5: 5029.645399194005195 Step #5: 5051.446452409430110 Step #5: 5073.247505624855025 Step #5: 5095.048558840279940 Step #5: 5116.849612055704855 Step #5: 5138.650665271129770 Step #5: 5160.451718486554685 Step #5: 5182.252771701979600 Step #5: 5204.053824917404515 Step #5: 5225.854878132829430 Step #5: 5247.655931348254345 Step #5: 5269.456984563679260 Step #5: 5291.258037779104175 Step #5: 5313.059090994529090 Step #5: 5334.860144209954005 Step #5: 5356.661197425378920 Step #5: 5378.462250640803835 Step #5: 5400.263303856228750 Step #5: 5422.064357071653665 Step #5: 5443.865410287078580 Step #5: 5465.666463502503495 Step #5: 5487.467516717928410 Step #5: 5509.268569933353325 Step #5: 5531.069623148778240 Step #5: 5552.870676364203155 Step #5: 5574.671729579628070 Step #5: 5596.472782795052985 Step #5: 5618.273836010477900 Step #5: 5640.074889225902815 Step #5: 5661.875942441327730 Step #5: 5683.676995656752645 Step #5: 5705.478048872177560 Step #5: 5727.279102087602475 Step #5: 5749.080155303027390 Step #5: 5770.881208518452305 Step #5: 5792.682261733877220 Step #5: 5814.483314949302135 Step #5: 5836.284368164727050 Step #5: 5858.085421380151965 Step #5: 5879.886474595576880 Step #5: 5901.687527811001795 Step #5: 5923.488581026426710 Step #5: 5945.289634241851625 Step #5: 5967.090687457276540 Step #5: 5988.891740672701455 Step #5: 6010.692793888126370 Step #5: 6032.493847103551285 Step #5: 6054.294900318976200 Step #5: 6076.095953534401115 Step #5: 6097.897006749826030 Step #5: 6119.698059965250945 Step #5: 6141.499113180675860 Step #5: 6163.300166396100775 Step #5: 6185.101219611525690 Step #5: 6206.902272826950605 Step #5: 6228.703326042375520 Step #5: 6250.504379257800435 Step #5: 6272.305432473225350 Step #5: 6294.106485688650265 Step #5: 6315.907538904075180 Step #5: 6337.708592119500095 Step #5: 6359.509645334925010 Step #5: 6381.310698550349925 Step #5: 6403.111751765774840 Step #5: 6424.912804981199755 Step #5: 6446.713858196624670 Step #5: 6468.514911412049585 Step #5: 6490.315964627474500 Step #5: 6512.117017842899415 Step #5: 6533.918071058324330 Step #5: 6555.719124273749245 Step #5: 6577.520177489174160 Step #5: 6599.321230704599075 Step #5: 6621.122283920023990 Step #5: 6642.923337135448905 Step #5: 6664.724390350873820 Step #5: 6686.525443566298735 Step #5: 6708.326496781723650 Step #5: 6730.127549997148565 Step #5: 6751.928603212573480 Step #5: 6773.729656427998395 Step #5: 6795.530709643423310 Step #5: 6817.331762858848225 Step #5: 6839.132816074273140 Step #5: 6860.933869289698055 Step #5: 6882.734922505122970 Step #5: 6904.535975720547885 Step #5: 6926.337028935972800 Step #5: 6948.138082151397715 Step #5: 6969.939135366822630 Step #5: 6991.740188582247545 Step #5: 7013.541241797672460 Step #5: 7035.342295013097375 Step #5: 7057.143348228522290 Step #5: 7078.944401443947205 Step #5: 7100.745454659372120 Step #5: 7122.546507874797035 Step #5: 7144.347561090221950 Step #5: 7166.148614305646865 Step #5: 7187.949667521071780 Step #5: 7209.750720736496695 Step #5: 7231.551773951921610 Step #5: 7253.352827167346525 Step #5: 7275.153880382771440 Step #5: 7296.954933598196355 Step #5: 7318.755986813621270 Step #5: 7340.557040029046185 Step #5: 7362.358093244471100 Step #5: 7384.159146459896015 Step #5: 7405.960199675320930 Step #5: 7427.761252890745845 Step #5: 7449.562306106170760 Step #5: 7471.363359321595675 Step #5: 7493.164412537020590 Step #5: 7514.965465752445505 Step #5: 7536.766518967870420 Step #5: 7558.567572183295335 Step #5: 7580.368625398720250 Step #5: 7602.169678614145165 Step #5: 7623.970731829570080 Step #5: 7645.771785044994995 Step #5: 7667.572838260419910 Step #5: 7689.373891475844825 Step #5: 7711.174944691269740 Step #5: 7732.975997906694655 Step #5: 7754.777051122119570 Step #5: 7776.578104337544485 Step #5: 7798.379157552969400 Step #5: 7820.180210768394315 Step #5: 7841.981263983819230 Step #5: 7863.782317199244145 Step #5: 7885.583370414669060 Step #5: 7907.384423630093975 Step #5: 7929.185476845518890 Step #5: 7950.986530060943805 Step #5: 7972.787583276368720 Step #5: 7994.588636491793635 Step #5: 8016.389689707218550 Step #5: 8038.190742922643465 Step #5: 8059.991796138068380 Step #5: 8081.792849353493295 Step #5: 8103.593902568918210 Step #5: 8125.394955784343125 Step #5: 8147.196008999768040 Step #5: 8168.997062215192955 Step #5: -8190.798115430617870 Step #5: +8190.798115430617869 Step #5: 8212.599168646042785 Step #5: 8234.400221861467700 Step #5: 8256.201275076892615 Step #5: 8278.002328292317530 Step #5: 8299.803381507742445 Step #5: 8321.604434723167360 Step #5: 8343.405487938592275 Step #5: 8365.206541154017190 Step #5: 8387.007594369442105 Step #5: 8408.808647584867020 Step #5: 8430.609700800291935 Step #5: 8452.410754015716850 Step #5: 8474.211807231141765 Step #5: 8496.012860446566680 Step #5: 8517.813913661991595 Step #5: 8539.614966877416510 Step #5: 8561.416020092841425 Step #5: 8583.217073308266340 Step #5: 8605.018126523691255 Step #5: 8626.819179739116170 Step #5: 8648.620232954541085 Step #5: 8670.421286169966000 Step #5: 8692.222339385390915 Step #5: 8714.023392600815830 Step #5: 8735.824445816240745 Step #5: 8757.625499031665660 Step #5: 8779.426552247090575 Step #5: 8801.227605462515490 Step #5: 8823.028658677940405 Step #5: 8844.829711893365320 Step #5: 8866.630765108790235 Step #5: 8888.431818324215150 Step #5: -8910.232871539640065 Step #5: +8910.232871539640064 Step #5: 8932.033924755064980 Step #5: 8953.834977970489895 Step #5: 8975.636031185914810 Step #5: 8997.437084401339725 Step #5: 9019.238137616764640 Step #5: 9041.039190832189555 Step #5: 9062.840244047614470 Step #5: 9084.641297263039385 Step #5: 9106.442350478464300 Step #5: 9128.243403693889215 Step #5: 9150.044456909314130 Step #5: 9171.845510124739045 Step #5: 9193.646563340163960 Step #5: -9215.447616555588875 Step #5: +9215.447616555588874 Step #5: 9237.248669771013790 Step #5: 9259.049722986438705 Step #5: 9280.850776201863620 Step #5: 9302.651829417288535 Step #5: 9324.452882632713450 Step #5: 9346.253935848138365 Step #5: 9368.054989063563280 Step #5: 9389.856042278988195 Step #5: 9411.657095494413110 Step #5: 9433.458148709838025 Step #5: 9455.259201925262940 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: seq ["-50", "21.801053215424915", "9464"] Step #5: Step #5: thread '' (2313) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: seq ["-50", "21.801053215424915", "9464"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2313== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6,0x5,0x2b,0x7a,0x6b,0x4f,0x2b, Step #5: \006\005+zkO+ Step #5: artifact_prefix='./'; Test unit written to ./crash-65ee278fd055560a32bdd3a684ff757e9b4e57ba Step #5: Base64: BgUremtPKw== Step #5: MERGE-OUTER: attempt 2 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032611137 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge2215.txt' Step #5: MERGE-INNER: '/corpus/fuzz_seq/65ee278fd055560a32bdd3a684ff757e9b4e57ba' caused a failure at the previous merge step Step #5: MERGE-INNER: 317 total files; 194 processed earlier; will process 123 files now Step #5: Running test ["seq", "5130", "92"] Step #5: === Compare result for: seq ["5130", "92"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-36", "-39.772292456590904", "4054"] Step #5: === Compare result for: seq ["-36", "-39.772292456590904", "4054"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-58.4142106848422", "-8816", "7537"] Step #5: === Compare result for: seq ["-58.4142106848422", "-8816", "7537"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "59", "-60.91479726396831", "-73"] Step #5: === Compare result for: seq ["59", "-60.91479726396831", "-73"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "55", "-4", "-90"] Step #5: === Compare result for: seq ["55", "-4", "-90"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8852", "-73"] Step #5: === Compare result for: seq ["-8852", "-73"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "31", "-29"] Step #5: === Compare result for: seq ["31", "-29"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "69", "-8.895832587957074"] Step #5: === Compare result for: seq ["69", "-8.895832587957074"] Step #5: === OK Same behavior Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "8797", "-99.15269444342604"] Step #5: === Compare result for: seq ["8797", "-99.15269444342604"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3072", "-25"] Step #5: === Compare result for: seq ["3072", "-25"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-52"] Step #5: === Compare result for: seq ["-52"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "50.84975547633678", "13.907072011839091", "-75"] Step #5: === Compare result for: seq ["50.84975547633678", "13.907072011839091", "-75"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "100", "-87.74143653651775", "-97.73247549886071"] Step #5: === Compare result for: seq ["100", "-87.74143653651775", "-97.73247549886071"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "45.27161241404528", "17.528534220458923", "-58"] Step #5: === Compare result for: seq ["45.27161241404528", "17.528534220458923", "-58"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "32", "-64"] Step #5: === Compare result for: seq ["32", "-64"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-50"] Step #5: === Compare result for: seq ["-50"] Step #5: === OK Same behavior Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "64", "94", "-555"] Step #5: === Compare result for: seq ["64", "94", "-555"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8190", "44.1997414374392"] Step #5: === Compare result for: seq ["-8190", "44.1997414374392"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "40"] Step #5: === Compare result for: seq ["40"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-12", "40", "-60"] Step #5: === Compare result for: seq ["-12", "40", "-60"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3205"] Step #5: === Compare result for: seq ["3205"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "44", "-27", "-100"] Step #5: === Compare result for: seq ["44", "-27", "-100"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3386", "-85", "-0.35375728843725085"] Step #5: === Compare result for: seq ["3386", "-85", "-0.35375728843725085"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-5594"] Step #5: === Compare result for: seq ["-5594"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "12", "86", "12"] Step #5: === Compare result for: seq ["12", "86", "12"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-4344", "6", "-3402"] Step #5: === Compare result for: seq ["-4344", "6", "-3402"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-44.3148924098006", "-50", "1586"] Step #5: === Compare result for: seq ["-44.3148924098006", "-50", "1586"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7778"] Step #5: === Compare result for: seq ["-7778"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-11.387959329724367", "3398"] Step #5: === Compare result for: seq ["-11.387959329724367", "3398"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3133"] Step #5: === Compare result for: seq ["3133"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4443", "85", "15"] Step #5: === Compare result for: seq ["4443", "85", "15"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-61.33987732594082", "-75"] Step #5: === Compare result for: seq ["-61.33987732594082", "-75"] Step #5: === OK Same behavior Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-14.118462383921269"] Step #5: === Compare result for: seq ["-14.118462383921269"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "77", "57"] Step #5: === Compare result for: seq ["77", "57"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-66", "-4256"] Step #5: === Compare result for: seq ["-66", "-4256"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "100"] Step #5: === Compare result for: seq ["100"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-1039", "82.18353135221767", "9933"] Step #5: === Compare result for: seq ["-1039", "82.18353135221767", "9933"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "6"] Step #5: === Compare result for: seq ["6"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-100"] Step #5: === Compare result for: seq ["-100"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "22.141453145243432"] Step #5: === Compare result for: seq ["22.141453145243432"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "45.93750437190863", "-10", "5930"] Step #5: === Compare result for: seq ["45.93750437190863", "-10", "5930"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-33.24961561151301", "99"] Step #5: === Compare result for: seq ["-33.24961561151301", "99"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "37.751255310568325", "89.36174354398835"] Step #5: === Compare result for: seq ["37.751255310568325", "89.36174354398835"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-36.45904130959998", "-2978"] Step #5: === Compare result for: seq ["-36.45904130959998", "-2978"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "5769", "32"] Step #5: === Compare result for: seq ["5769", "32"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8408"] Step #5: === Compare result for: seq ["-8408"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-2"] Step #5: === Compare result for: seq ["-2"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-40"] Step #5: === Compare result for: seq ["-40"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "7357", "6867", "43"] Step #5: === Compare result for: seq ["7357", "6867", "43"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "46.81003014519689", "9"] Step #5: === Compare result for: seq ["46.81003014519689", "9"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-22.969066243356423", "90", "-78"] Step #5: === Compare result for: seq ["-22.969066243356423", "90", "-78"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-1237", "-83.50953727077575"] Step #5: === Compare result for: seq ["-1237", "-83.50953727077575"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-6156", "92.37342830123669", "80.2727037895944"] Step #5: === Compare result for: seq ["-6156", "92.37342830123669", "80.2727037895944"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-31", "-63", "26.76781896515385"] Step #5: === Compare result for: seq ["-31", "-63", "26.76781896515385"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "87", "-100", "-924"] Step #5: === Compare result for: seq ["87", "-100", "-924"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-46", "99", "10"] Step #5: === Compare result for: seq ["-46", "99", "10"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "7502"] Step #5: === Compare result for: seq ["7502"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-52.3351832319205", "-76", "42"] Step #5: === Compare result for: seq ["-52.3351832319205", "-76", "42"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-9111"] Step #5: === Compare result for: seq ["-9111"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-45.600145206323006", "84"] Step #5: === Compare result for: seq ["-45.600145206323006", "84"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-31.7873924205835"] Step #5: === Compare result for: seq ["-31.7873924205835"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "52", "62.03864647878828"] Step #5: === Compare result for: seq ["52", "62.03864647878828"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "16"] Step #5: === Compare result for: seq ["16"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-84"] Step #5: === Compare result for: seq ["-84"] Step #5: === OK Same behavior Step #5: Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["seq", "-53"] Step #5: === Compare result for: seq ["-53"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7776"] Step #5: === Compare result for: seq ["-7776"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "4727", "-6704", "1248"] Step #5: === Compare result for: seq ["4727", "-6704", "1248"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "75.0273550937838"] Step #5: === Compare result for: seq ["75.0273550937838"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "5242"] Step #5: === Compare result for: seq ["5242"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-16.78610002468264", "8550"] Step #5: === Compare result for: seq ["-16.78610002468264", "8550"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "45"] Step #5: === Compare result for: seq ["45"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "99", "9"] Step #5: === Compare result for: seq ["99", "9"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-70.66155230937005", "-23", "-55"] Step #5: === Compare result for: seq ["-70.66155230937005", "-23", "-55"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-6603", "-10.418147408729624", "71"] Step #5: === Compare result for: seq ["-6603", "-10.418147408729624", "71"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-25.54992673378584", "54", "5.57053480339124"] Step #5: === Compare result for: seq ["-25.54992673378584", "54", "5.57053480339124"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "9377", "85", "83.42143755141876"] Step #5: === Compare result for: seq ["9377", "85", "83.42143755141876"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "2"] Step #5: === Compare result for: seq ["2"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-4122"] Step #5: === Compare result for: seq ["-4122"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "47.081137762811125", "8", "85"] Step #5: === Compare result for: seq ["47.081137762811125", "8", "85"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "22"] Step #5: === Compare result for: seq ["22"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8226"] Step #5: === Compare result for: seq ["-8226"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3167", "9020"] Step #5: === Compare result for: seq ["3167", "9020"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "38.64125111277542", "-12"] Step #5: === Compare result for: seq ["38.64125111277542", "-12"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq"] Step #5: === Compare result for: seq [] Step #5: Rust stderr: Step #5: seq-error-no-arguments Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: missing operand Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-no-arguments Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +missing operand Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq [] Step #5: Step #5: Running test ["seq", "-75", "5389"] Step #5: === Compare result for: seq ["-75", "5389"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "16", "25"] Step #5: === Compare result for: seq ["16", "25"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8759", "-15"] Step #5: === Compare result for: seq ["-8759", "-15"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "66.26985483059312", "88"] Step #5: === Compare result for: seq ["66.26985483059312", "88"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "7.677054474728834", "2758"] Step #5: === Compare result for: seq ["7.677054474728834", "2758"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq"] Step #5: === Compare result for: seq [] Step #5: Rust stderr: Step #5: seq-error-no-arguments Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: missing operand Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-no-arguments Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +missing operand Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq [] Step #5: Step #5: Running test ["seq", "-68.95853926769182", "-40.120385420968184"] Step #5: === Compare result for: seq ["-68.95853926769182", "-40.120385420968184"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-17", "-71.35775792521648"] Step #5: === Compare result for: seq ["-17", "-71.35775792521648"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-35.667083981603426", "81"] Step #5: === Compare result for: seq ["-35.667083981603426", "81"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "56"] Step #5: === Compare result for: seq ["56"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-69", "-34"] Step #5: === Compare result for: seq ["-69", "-34"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "6343", "96.54367964883807", "80"] Step #5: === Compare result for: seq ["6343", "96.54367964883807", "80"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-141"] Step #5: === Compare result for: seq ["-141"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-63.48944036250366"] Step #5: === Compare result for: seq ["-63.48944036250366"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-4759", "-133"] Step #5: === Compare result for: seq ["-4759", "-133"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "1679"] Step #5: === Compare result for: seq ["1679"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "o0i2A", "-97"] Step #5: === Compare result for: seq ["o0i2A", "-97"] Step #5: Rust stderr: Step #5: seq-error-parse Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: GNU stderr: Step #5: invalid floating point argument: 'o0i2A' Step #5: Try 'seq --help' for more information. Step #5: --- START diff Step #5: -seq-error-parse Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_seq --help' for more information. Step #5: +invalid floating point argument: 'o0i2A' Step #5: +Try 'seq --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: seq ["o0i2A", "-97"] Step #5: Step #5: Running test ["seq", "7183", "-33.85275874231964", "85.94716919599591"] Step #5: === Compare result for: seq ["7183", "-33.85275874231964", "85.94716919599591"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-69.61150639910092"] Step #5: === Compare result for: seq ["-69.61150639910092"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-12.937418596591584"] Step #5: === Compare result for: seq ["-12.937418596591584"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-50.06011995108746"] Step #5: === Compare result for: seq ["-50.06011995108746"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "34"] Step #5: === Compare result for: seq ["34"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "3412", "14"] Step #5: === Compare result for: seq ["3412", "14"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-72.01628040551107", "-79"] Step #5: === Compare result for: seq ["-72.01628040551107", "-79"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-8653", "75.01565570941361", "-9433"] Step #5: === Compare result for: seq ["-8653", "75.01565570941361", "-9433"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "100", "-5694"] Step #5: === Compare result for: seq ["100", "-5694"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-88"] Step #5: === Compare result for: seq ["-88"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-29"] Step #5: === Compare result for: seq ["-29"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "49.514399714308325"] Step #5: === Compare result for: seq ["49.514399714308325"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-6654"] Step #5: === Compare result for: seq ["-6654"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-100"] Step #5: === Compare result for: seq ["-100"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-2239", "22", "-19.198953327735154"] Step #5: === Compare result for: seq ["-2239", "22", "-19.198953327735154"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "38.54658373772867"] Step #5: === Compare result for: seq ["38.54658373772867"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-12", "4341"] Step #5: === Compare result for: seq ["-12", "4341"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-4925", "98"] Step #5: === Compare result for: seq ["-4925", "98"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-82.39294808294616", "68", "-11.570953677135833"] Step #5: === Compare result for: seq ["-82.39294808294616", "68", "-11.570953677135833"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "36", "43.38670382104476"] Step #5: === Compare result for: seq ["36", "43.38670382104476"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-7471", "-85"] Step #5: === Compare result for: seq ["-7471", "-85"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["seq", "-14.455775205532234", "-86"] Step #5: === Compare result for: seq ["-14.455775205532234", "-86"] Step #5: === OK Same behavior Step #5: Step #5: #123 DONE exec/s: 0 rss: 36Mb Step #5: MERGE-OUTER: successful in 2 attempt(s) Step #5: MERGE-OUTER: the control file has 27457 bytes Step #5: MERGE-OUTER: consumed 0Mb (26Mb rss) to parse the control file Step #5: MERGE-OUTER: 0 new files with 0 new features added; 0 new coverage edges Step #5: [2025-10-03 06:09:05,693 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:05,702 INFO] Finished finding shared libraries for targets. Step #5: [2025-10-03 06:09:05,850 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:05,859 INFO] Finished finding shared libraries for targets. Step #5: [2025-10-03 06:09:05,863 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:05,872 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_sort_error.log Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_cut_error.log Step #5: Error occured while running fuzz_cksum: Step #5: Cov returncode: 0, grep returncode: 0 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031700189 Step #5: MERGE-OUTER: 425 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031715228 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: 425 total files; 0 processed earlier; will process 425 files now Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "bsd", "/tmp/zlbmynlfld"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "bsd", "/tmp/zlbmynlfld"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "bsd", "/tmp/zlbmynlfld"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "bsd", "/tmp/zlbmynlfld"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/khoiqgwxqj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/khoiqgwxqj"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/khoiqgwxqj"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/khoiqgwxqj"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/eamqddvlrk", "-a", "sha256", "/tmp/bbjptiqtyi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/eamqddvlrk", "-a", "sha256", "/tmp/bbjptiqtyi"] Step #5: === Compare result for: cksum ["-c", "/tmp/eamqddvlrk", "-a", "sha256", "/tmp/bbjptiqtyi"] Step #5: Rust stderr: Step #5: /tmp/eamqddvlrk: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/bbjptiqtyi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eamqddvlrk: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/bbjptiqtyi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/eamqddvlrk", "-a", "sha256", "/tmp/bbjptiqtyi"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/elytraafqs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/elytraafqs"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/elytraafqs"] Step #5: Rust stderr: Step #5: /tmp/elytraafqs: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/elytraafqs: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/elytraafqs"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/uyilvunglv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/uyilvunglv"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/uyilvunglv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/uyilvunglv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/ambplrpbfw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/ambplrpbfw"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/ambplrpbfw"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/ambplrpbfw"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "blake2b", "/tmp/bngasdrmzm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "blake2b", "/tmp/bngasdrmzm"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "blake2b", "/tmp/bngasdrmzm"] Step #5: Rust stderr: Step #5: /tmp/bngasdrmzm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bngasdrmzm: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "blake2b", "/tmp/bngasdrmzm"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "--base64", "-c", "-a", "md5", "/tmp/yjykzbftra"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "--base64", "-c", "-a", "md5", "/tmp/yjykzbftra"] Step #5: === Compare result for: cksum ["-a", "sm3", "--base64", "-c", "-a", "md5", "/tmp/yjykzbftra"] Step #5: Rust stderr: Step #5: /tmp/yjykzbftra: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yjykzbftra: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "--base64", "-c", "-a", "md5", "/tmp/yjykzbftra"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "blake2b", "/tmp/xuebaildvp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "blake2b", "/tmp/xuebaildvp"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "blake2b", "/tmp/xuebaildvp"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "blake2b", "/tmp/xuebaildvp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/hmxcnbofjj", "-a", "sha224", "/tmp/jgddjzflhb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/hmxcnbofjj", "-a", "sha224", "/tmp/jgddjzflhb"] Step #5: === Compare result for: cksum ["-c", "/tmp/hmxcnbofjj", "-a", "sha224", "/tmp/jgddjzflhb"] Step #5: Rust stderr: Step #5: /tmp/hmxcnbofjj: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/jgddjzflhb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hmxcnbofjj: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/jgddjzflhb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/hmxcnbofjj", "-a", "sha224", "/tmp/jgddjzflhb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/hdgxncthnj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/hdgxncthnj"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/hdgxncthnj"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/hdgxncthnj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sm3", "/tmp/gnocccwpir"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sm3", "/tmp/gnocccwpir"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sm3", "/tmp/gnocccwpir"] Step #5: Rust stderr: Step #5: /tmp/gnocccwpir: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gnocccwpir: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sm3", "/tmp/gnocccwpir"] Step #5: Step #5: === TEST cksum ["cksum", "file_a9"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_a9"] Step #5: === Compare result for: cksum ["file_a9"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/lyanvrwmev", "-a", "sha384", "/tmp/frkmudrvrx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/lyanvrwmev", "-a", "sha384", "/tmp/frkmudrvrx"] Step #5: === Compare result for: cksum ["-c", "/tmp/lyanvrwmev", "-a", "sha384", "/tmp/frkmudrvrx"] Step #5: Rust stderr: Step #5: /tmp/lyanvrwmev: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/frkmudrvrx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lyanvrwmev: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/frkmudrvrx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/lyanvrwmev", "-a", "sha384", "/tmp/frkmudrvrx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/hpldugrsae"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/hpldugrsae"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/hpldugrsae"] Step #5: Rust stderr: Step #5: /tmp/hpldugrsae: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hpldugrsae: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/hpldugrsae"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "crc", "/tmp/qgpgkjhfls"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "crc", "/tmp/qgpgkjhfls"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "crc", "/tmp/qgpgkjhfls"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "crc", "/tmp/qgpgkjhfls"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/rmzwkdeurb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/rmzwkdeurb"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/rmzwkdeurb"] Step #5: Rust stderr: Step #5: /tmp/rmzwkdeurb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rmzwkdeurb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/rmzwkdeurb"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "sha224", "/tmp/gnypnlxpqb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "sha224", "/tmp/gnypnlxpqb"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "sha224", "/tmp/gnypnlxpqb"] Step #5: Rust stderr: Step #5: /tmp/gnypnlxpqb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gnypnlxpqb: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "sha224", "/tmp/gnypnlxpqb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/jmtulyscpw", "-a", "sha256", "/tmp/sreebuqzcz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/jmtulyscpw", "-a", "sha256", "/tmp/sreebuqzcz"] Step #5: === Compare result for: cksum ["-c", "/tmp/jmtulyscpw", "-a", "sha256", "/tmp/sreebuqzcz"] Step #5: Rust stderr: Step #5: /tmp/jmtulyscpw: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/sreebuqzcz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jmtulyscpw: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/sreebuqzcz: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/jmtulyscpw", "-a", "sha256", "/tmp/sreebuqzcz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha256", "/tmp/kzuzerpekr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha256", "/tmp/kzuzerpekr"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha256", "/tmp/kzuzerpekr"] Step #5: Rust stderr: Step #5: /tmp/kzuzerpekr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kzuzerpekr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha256", "/tmp/kzuzerpekr"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "398", "-c", "-a", "bsd", "/tmp/uhhzpsczgl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "398", "-c", "-a", "bsd", "/tmp/uhhzpsczgl"] Step #5: === Compare result for: cksum ["-l", "398", "-c", "-a", "bsd", "/tmp/uhhzpsczgl"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "398", "-c", "-a", "bsd", "/tmp/uhhzpsczgl"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "-a", "sha384", "/tmp/ltsbwsbmxm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "-a", "sha384", "/tmp/ltsbwsbmxm"] Step #5: === Compare result for: cksum ["-a", "sha384", "-c", "-a", "sha384", "/tmp/ltsbwsbmxm"] Step #5: Rust stderr: Step #5: /tmp/ltsbwsbmxm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ltsbwsbmxm: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "-c", "-a", "sha384", "/tmp/ltsbwsbmxm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/fdnooicipf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/fdnooicipf"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/fdnooicipf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/fdnooicipf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/pimvmzbjys"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/pimvmzbjys"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/pimvmzbjys"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/pimvmzbjys"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "sha384", "/tmp/sqplwduxiw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "sha384", "/tmp/sqplwduxiw"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "sha384", "/tmp/sqplwduxiw"] Step #5: Rust stderr: Step #5: /tmp/sqplwduxiw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sqplwduxiw: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "sha384", "/tmp/sqplwduxiw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/vcdhdxtsrq", "-a", "sha512", "/tmp/sfqmggusjz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/vcdhdxtsrq", "-a", "sha512", "/tmp/sfqmggusjz"] Step #5: === Compare result for: cksum ["-c", "/tmp/vcdhdxtsrq", "-a", "sha512", "/tmp/sfqmggusjz"] Step #5: Rust stderr: Step #5: /tmp/vcdhdxtsrq: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/sfqmggusjz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vcdhdxtsrq: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/sfqmggusjz: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/vcdhdxtsrq", "-a", "sha512", "/tmp/sfqmggusjz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-l", "165", "-c", "/tmp/jzwdylhess", "-a", "crc", "/tmp/ajjwjlkdgv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-l", "165", "-c", "/tmp/jzwdylhess", "-a", "crc", "/tmp/ajjwjlkdgv"] Step #5: === Compare result for: cksum ["-a", "sm3", "-l", "165", "-c", "/tmp/jzwdylhess", "-a", "crc", "/tmp/ajjwjlkdgv"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-l", "165", "-c", "/tmp/jzwdylhess", "-a", "crc", "/tmp/ajjwjlkdgv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/eicykuzedi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/eicykuzedi"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/eicykuzedi"] Step #5: Rust stderr: Step #5: /tmp/eicykuzedi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eicykuzedi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/eicykuzedi"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "136", "-c", "/tmp/bpszajnqpc", "-a", "sha512", "/tmp/zyzlwibhce"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "136", "-c", "/tmp/bpszajnqpc", "-a", "sha512", "/tmp/zyzlwibhce"] Step #5: === Compare result for: cksum ["-l", "136", "-c", "/tmp/bpszajnqpc", "-a", "sha512", "/tmp/zyzlwibhce"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "136", "-c", "/tmp/bpszajnqpc", "-a", "sha512", "/tmp/zyzlwibhce"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "sha224", "/tmp/fszmxsgprt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "sha224", "/tmp/fszmxsgprt"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "sha224", "/tmp/fszmxsgprt"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "sha224", "/tmp/fszmxsgprt"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "--tag", "-c", "-a", "crc", "/tmp/hvdzmhicwa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "--tag", "-c", "-a", "crc", "/tmp/hvdzmhicwa"] Step #5: === Compare result for: cksum ["-a", "sha512", "--tag", "-c", "-a", "crc", "/tmp/hvdzmhicwa"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "--tag", "-c", "-a", "crc", "/tmp/hvdzmhicwa"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/pbqqnsbtfr", "-a", "sha256", "/tmp/nnumbjyrwd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/pbqqnsbtfr", "-a", "sha256", "/tmp/nnumbjyrwd"] Step #5: === Compare result for: cksum ["-c", "/tmp/pbqqnsbtfr", "-a", "sha256", "/tmp/nnumbjyrwd"] Step #5: Rust stderr: Step #5: /tmp/pbqqnsbtfr: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/nnumbjyrwd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pbqqnsbtfr: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/nnumbjyrwd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/pbqqnsbtfr", "-a", "sha256", "/tmp/nnumbjyrwd"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/iouvphbwwt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/iouvphbwwt"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/iouvphbwwt"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/iouvphbwwt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/kralpboizv", "-a", "sm3", "/tmp/vksxlxwcyc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/kralpboizv", "-a", "sm3", "/tmp/vksxlxwcyc"] Step #5: === Compare result for: cksum ["-c", "/tmp/kralpboizv", "-a", "sm3", "/tmp/vksxlxwcyc"] Step #5: Rust stderr: Step #5: /tmp/kralpboizv: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/vksxlxwcyc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kralpboizv: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/vksxlxwcyc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/kralpboizv", "-a", "sm3", "/tmp/vksxlxwcyc"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/oquysuwths"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/oquysuwths"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/oquysuwths"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/oquysuwths"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/hcnellbsik"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/hcnellbsik"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/hcnellbsik"] Step #5: Rust stderr: Step #5: /tmp/hcnellbsik: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hcnellbsik: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/hcnellbsik"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "crc", "/tmp/blubfnjsxb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "crc", "/tmp/blubfnjsxb"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "crc", "/tmp/blubfnjsxb"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "crc", "/tmp/blubfnjsxb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/yhptaqqzyo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/yhptaqqzyo"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/yhptaqqzyo"] Step #5: Rust stderr: Step #5: /tmp/yhptaqqzyo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yhptaqqzyo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/yhptaqqzyo"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "--tag", "-c", "-a", "md5", "/tmp/fmwtpkwevq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "--tag", "-c", "-a", "md5", "/tmp/fmwtpkwevq"] Step #5: === Compare result for: cksum ["-a", "crc", "--tag", "-c", "-a", "md5", "/tmp/fmwtpkwevq"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "--tag", "-c", "-a", "md5", "/tmp/fmwtpkwevq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/giqgqmjazy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/giqgqmjazy"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/giqgqmjazy"] Step #5: Rust stderr: Step #5: /tmp/giqgqmjazy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/giqgqmjazy: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/giqgqmjazy"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sha224", "/tmp/qspijkbrci"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sha224", "/tmp/qspijkbrci"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sha224", "/tmp/qspijkbrci"] Step #5: Rust stderr: Step #5: /tmp/qspijkbrci: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qspijkbrci: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sha224", "/tmp/qspijkbrci"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/wqxseeylnx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/wqxseeylnx"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/wqxseeylnx"] Step #5: Rust stderr: Step #5: /tmp/wqxseeylnx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wqxseeylnx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/wqxseeylnx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/dzcictmbkq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/dzcictmbkq"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/dzcictmbkq"] Step #5: Rust stderr: Step #5: /tmp/dzcictmbkq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dzcictmbkq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/dzcictmbkq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/zffqxdoopg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/zffqxdoopg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/zffqxdoopg"] Step #5: Rust stderr: Step #5: /tmp/zffqxdoopg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zffqxdoopg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/zffqxdoopg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/vbwdzezojt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/vbwdzezojt"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/vbwdzezojt"] Step #5: Rust stderr: Step #5: /tmp/vbwdzezojt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vbwdzezojt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/vbwdzezojt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/hzbhksuxmu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/hzbhksuxmu"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/hzbhksuxmu"] Step #5: Rust stderr: Step #5: /tmp/hzbhksuxmu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hzbhksuxmu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/hzbhksuxmu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/eoospqqdyv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/eoospqqdyv"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/eoospqqdyv"] Step #5: Rust stderr: Step #5: /tmp/eoospqqdyv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eoospqqdyv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/eoospqqdyv"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-l", "230", "-c", "-a", "bsd", "/tmp/wnbcjutabz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-l", "230", "-c", "-a", "bsd", "/tmp/wnbcjutabz"] Step #5: === Compare result for: cksum ["--untagged", "-l", "230", "-c", "-a", "bsd", "/tmp/wnbcjutabz"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-l", "230", "-c", "-a", "bsd", "/tmp/wnbcjutabz"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/prooswhepu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/prooswhepu"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/prooswhepu"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/prooswhepu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/hlzxmprqmv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/hlzxmprqmv"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/hlzxmprqmv"] Step #5: Rust stderr: Step #5: /tmp/hlzxmprqmv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hlzxmprqmv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/hlzxmprqmv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "/tmp/zjotadxjxn", "-a", "sysv", "/tmp/fzgykrpqtl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "/tmp/zjotadxjxn", "-a", "sysv", "/tmp/fzgykrpqtl"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "/tmp/zjotadxjxn", "-a", "sysv", "/tmp/fzgykrpqtl"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "/tmp/zjotadxjxn", "-a", "sysv", "/tmp/fzgykrpqtl"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/vjzszclyew"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/vjzszclyew"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/vjzszclyew"] Step #5: Rust stderr: Step #5: /tmp/vjzszclyew: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vjzszclyew: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/vjzszclyew"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/jgobopjnww"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/jgobopjnww"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/jgobopjnww"] Step #5: Rust stderr: Step #5: /tmp/jgobopjnww: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jgobopjnww: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/jgobopjnww"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/qhcyyxzsmm", "-a", "md5", "/tmp/slypvqtmef"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/qhcyyxzsmm", "-a", "md5", "/tmp/slypvqtmef"] Step #5: === Compare result for: cksum ["-c", "/tmp/qhcyyxzsmm", "-a", "md5", "/tmp/slypvqtmef"] Step #5: Rust stderr: Step #5: /tmp/qhcyyxzsmm: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/slypvqtmef: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qhcyyxzsmm: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/slypvqtmef: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/qhcyyxzsmm", "-a", "md5", "/tmp/slypvqtmef"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "-a", "bsd", "/tmp/gtpehpiitf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "-a", "bsd", "/tmp/gtpehpiitf"] Step #5: === Compare result for: cksum ["-a", "sha384", "-c", "-a", "bsd", "/tmp/gtpehpiitf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "-c", "-a", "bsd", "/tmp/gtpehpiitf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/ziachdsvna", "-a", "crc", "/tmp/fvjjujxtxv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/ziachdsvna", "-a", "crc", "/tmp/fvjjujxtxv"] Step #5: === Compare result for: cksum ["-c", "/tmp/ziachdsvna", "-a", "crc", "/tmp/fvjjujxtxv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/ziachdsvna", "-a", "crc", "/tmp/fvjjujxtxv"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-l", "480", "-c", "-a", "sha384", "/tmp/ieohraaxcy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-l", "480", "-c", "-a", "sha384", "/tmp/ieohraaxcy"] Step #5: === Compare result for: cksum ["--base64", "-l", "480", "-c", "-a", "sha384", "/tmp/ieohraaxcy"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-l", "480", "-c", "-a", "sha384", "/tmp/ieohraaxcy"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "--base64", "-c", "-a", "sha224", "/tmp/hlykqeoeef"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "--base64", "-c", "-a", "sha224", "/tmp/hlykqeoeef"] Step #5: === Compare result for: cksum ["-a", "sha384", "--base64", "-c", "-a", "sha224", "/tmp/hlykqeoeef"] Step #5: Rust stderr: Step #5: /tmp/hlykqeoeef: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hlykqeoeef: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "--base64", "-c", "-a", "sha224", "/tmp/hlykqeoeef"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/repcjwtlem"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/repcjwtlem"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/repcjwtlem"] Step #5: Rust stderr: Step #5: /tmp/repcjwtlem: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/repcjwtlem: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/repcjwtlem"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/jyvlapksvj", "-a", "sha1", "/tmp/hilvrcivpa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/jyvlapksvj", "-a", "sha1", "/tmp/hilvrcivpa"] Step #5: === Compare result for: cksum ["-c", "/tmp/jyvlapksvj", "-a", "sha1", "/tmp/hilvrcivpa"] Step #5: Rust stderr: Step #5: /tmp/jyvlapksvj: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/hilvrcivpa: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jyvlapksvj: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/hilvrcivpa: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/jyvlapksvj", "-a", "sha1", "/tmp/hilvrcivpa"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "209", "-c", "/tmp/ohmrovxrye", "-a", "sm3", "/tmp/jtranjcfds"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "209", "-c", "/tmp/ohmrovxrye", "-a", "sm3", "/tmp/jtranjcfds"] Step #5: === Compare result for: cksum ["-l", "209", "-c", "/tmp/ohmrovxrye", "-a", "sm3", "/tmp/jtranjcfds"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "209", "-c", "/tmp/ohmrovxrye", "-a", "sm3", "/tmp/jtranjcfds"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "242", "file_ILu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "242", "file_ILu"] Step #5: === Compare result for: cksum ["-l", "242", "file_ILu"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "242", "file_ILu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/tkhgisbyii"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/tkhgisbyii"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/tkhgisbyii"] Step #5: Rust stderr: Step #5: /tmp/tkhgisbyii: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tkhgisbyii: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/tkhgisbyii"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-l", "322", "-c", "-a", "sm3", "/tmp/bcgtgqqnrm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-l", "322", "-c", "-a", "sm3", "/tmp/bcgtgqqnrm"] Step #5: === Compare result for: cksum ["-a", "bsd", "-l", "322", "-c", "-a", "sm3", "/tmp/bcgtgqqnrm"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-l", "322", "-c", "-a", "sm3", "/tmp/bcgtgqqnrm"] Step #5: Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/kvbmkkvjra"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/kvbmkkvjra"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/kvbmkkvjra"] Step #5: Rust stderr: Step #5: /tmp/kvbmkkvjra: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kvbmkkvjra: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/kvbmkkvjra"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/dsxpnayads", "-a", "blake2b", "/tmp/xrnmexpllu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/dsxpnayads", "-a", "blake2b", "/tmp/xrnmexpllu"] Step #5: === Compare result for: cksum ["-c", "/tmp/dsxpnayads", "-a", "blake2b", "/tmp/xrnmexpllu"] Step #5: Rust stderr: Step #5: /tmp/dsxpnayads: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/xrnmexpllu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dsxpnayads: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/xrnmexpllu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/dsxpnayads", "-a", "blake2b", "/tmp/xrnmexpllu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/usjhuktknn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/usjhuktknn"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/usjhuktknn"] Step #5: Rust stderr: Step #5: /tmp/usjhuktknn: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/usjhuktknn: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/usjhuktknn"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/cqsjwdnnid"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/cqsjwdnnid"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/cqsjwdnnid"] Step #5: Rust stderr: Step #5: /tmp/cqsjwdnnid: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cqsjwdnnid: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/cqsjwdnnid"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/rbnmxedtjd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/rbnmxedtjd"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/rbnmxedtjd"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/rbnmxedtjd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/pwlcdjbokc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/pwlcdjbokc"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/pwlcdjbokc"] Step #5: Rust stderr: Step #5: /tmp/pwlcdjbokc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pwlcdjbokc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/pwlcdjbokc"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "285", "-c", "-a", "sha256", "/tmp/wjxbjlpupw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "285", "-c", "-a", "sha256", "/tmp/wjxbjlpupw"] Step #5: === Compare result for: cksum ["-l", "285", "-c", "-a", "sha256", "/tmp/wjxbjlpupw"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "285", "-c", "-a", "sha256", "/tmp/wjxbjlpupw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/iyfsnuwibn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/iyfsnuwibn"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/iyfsnuwibn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/iyfsnuwibn"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/vwstkbfvuc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/vwstkbfvuc"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/vwstkbfvuc"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/vwstkbfvuc"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/ctamhhobrw", "-a", "sha512", "/tmp/nlzzupklco"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/ctamhhobrw", "-a", "sha512", "/tmp/nlzzupklco"] Step #5: === Compare result for: cksum ["-c", "/tmp/ctamhhobrw", "-a", "sha512", "/tmp/nlzzupklco"] Step #5: Rust stderr: Step #5: /tmp/ctamhhobrw: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/nlzzupklco: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ctamhhobrw: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/nlzzupklco: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/ctamhhobrw", "-a", "sha512", "/tmp/nlzzupklco"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/epmhltzcvj", "-a", "crc", "/tmp/naonugmkcx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/epmhltzcvj", "-a", "crc", "/tmp/naonugmkcx"] Step #5: === Compare result for: cksum ["-c", "/tmp/epmhltzcvj", "-a", "crc", "/tmp/naonugmkcx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/epmhltzcvj", "-a", "crc", "/tmp/naonugmkcx"] Step #5: Step #5: === TEST cksum ["cksum", "file_Ã7🪛"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_Ã7🪛"] Step #5: === Compare result for: cksum ["file_Ã7🪛"] Step #5: Rust stderr: Step #5: file_Ã7🪛: No such file or directory Step #5: GNU stderr: Step #5: 'file_'$'\303\203''7'$'\360\237\252\233': No such file or directory Step #5: --- START diff Step #5: -file_Ã7🪛: No such file or directory Step #5: +'file_'$'\303\203''7'$'\360\237\252\233': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["file_Ã7🪛"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/jhztyewsyo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/jhztyewsyo"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/jhztyewsyo"] Step #5: Rust stderr: Step #5: /tmp/jhztyewsyo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jhztyewsyo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/jhztyewsyo"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "-a", "sha512", "/tmp/ieicqfwyot"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "-a", "sha512", "/tmp/ieicqfwyot"] Step #5: === Compare result for: cksum ["-a", "sha384", "-c", "-a", "sha512", "/tmp/ieicqfwyot"] Step #5: Rust stderr: Step #5: /tmp/ieicqfwyot: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ieicqfwyot: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "-c", "-a", "sha512", "/tmp/ieicqfwyot"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "/tmp/fcposaiohh", "-a", "md5", "/tmp/ycrvsgfxuj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "/tmp/fcposaiohh", "-a", "md5", "/tmp/ycrvsgfxuj"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "/tmp/fcposaiohh", "-a", "md5", "/tmp/ycrvsgfxuj"] Step #5: Rust stderr: Step #5: /tmp/fcposaiohh: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ycrvsgfxuj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fcposaiohh: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ycrvsgfxuj: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "/tmp/fcposaiohh", "-a", "md5", "/tmp/ycrvsgfxuj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/kiuwlimdpu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/kiuwlimdpu"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/kiuwlimdpu"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/kiuwlimdpu"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "20", "-c", "/tmp/pzpcpvxjvr", "-a", "bsd", "/tmp/qfbifkqjel"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "20", "-c", "/tmp/pzpcpvxjvr", "-a", "bsd", "/tmp/qfbifkqjel"] Step #5: === Compare result for: cksum ["-l", "20", "-c", "/tmp/pzpcpvxjvr", "-a", "bsd", "/tmp/qfbifkqjel"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "20", "-c", "/tmp/pzpcpvxjvr", "-a", "bsd", "/tmp/qfbifkqjel"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/rejhqnapoi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/rejhqnapoi"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/rejhqnapoi"] Step #5: Rust stderr: Step #5: /tmp/rejhqnapoi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rejhqnapoi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/rejhqnapoi"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/hhxxdxvelv", "-a", "crc", "/tmp/tlhqsgwfiy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/hhxxdxvelv", "-a", "crc", "/tmp/tlhqsgwfiy"] Step #5: === Compare result for: cksum ["-c", "/tmp/hhxxdxvelv", "-a", "crc", "/tmp/tlhqsgwfiy"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/hhxxdxvelv", "-a", "crc", "/tmp/tlhqsgwfiy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/fewfrazfds"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/fewfrazfds"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/fewfrazfds"] Step #5: Rust stderr: Step #5: /tmp/fewfrazfds: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fewfrazfds: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/fewfrazfds"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/umviclrfwh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/umviclrfwh"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/umviclrfwh"] Step #5: Rust stderr: Step #5: /tmp/umviclrfwh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/umviclrfwh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/umviclrfwh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/rsthafymvr", "-a", "sm3", "/tmp/eotgghoarj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/rsthafymvr", "-a", "sm3", "/tmp/eotgghoarj"] Step #5: === Compare result for: cksum ["-c", "/tmp/rsthafymvr", "-a", "sm3", "/tmp/eotgghoarj"] Step #5: Rust stderr: Step #5: /tmp/rsthafymvr: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/eotgghoarj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rsthafymvr: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/eotgghoarj: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/rsthafymvr", "-a", "sm3", "/tmp/eotgghoarj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/xnmprxrwqh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/xnmprxrwqh"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/xnmprxrwqh"] Step #5: Rust stderr: Step #5: /tmp/xnmprxrwqh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xnmprxrwqh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/xnmprxrwqh"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-l", "263", "-c", "-a", "sha1", "/tmp/yhiijvopil"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-l", "263", "-c", "-a", "sha1", "/tmp/yhiijvopil"] Step #5: === Compare result for: cksum ["-a", "sm3", "-l", "263", "-c", "-a", "sha1", "/tmp/yhiijvopil"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-l", "263", "-c", "-a", "sha1", "/tmp/yhiijvopil"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/ndekpcxslz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/ndekpcxslz"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/ndekpcxslz"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/ndekpcxslz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/eugmhahcrl", "-a", "sha384", "/tmp/zlspltgiwm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/eugmhahcrl", "-a", "sha384", "/tmp/zlspltgiwm"] Step #5: === Compare result for: cksum ["-c", "/tmp/eugmhahcrl", "-a", "sha384", "/tmp/zlspltgiwm"] Step #5: Rust stderr: Step #5: /tmp/eugmhahcrl: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zlspltgiwm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eugmhahcrl: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zlspltgiwm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/eugmhahcrl", "-a", "sha384", "/tmp/zlspltgiwm"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "--binary", "-l", "380", "-c", "-a", "md5", "/tmp/neqzzkvcsu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "--binary", "-l", "380", "-c", "-a", "md5", "/tmp/neqzzkvcsu"] Step #5: === Compare result for: cksum ["-a", "sysv", "--binary", "-l", "380", "-c", "-a", "md5", "/tmp/neqzzkvcsu"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "--binary", "-l", "380", "-c", "-a", "md5", "/tmp/neqzzkvcsu"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "--untagged", "-c", "/tmp/gdfknbzxjf", "-a", "blake2b", "/tmp/vdxwminnue"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "--untagged", "-c", "/tmp/gdfknbzxjf", "-a", "blake2b", "/tmp/vdxwminnue"] Step #5: === Compare result for: cksum ["-a", "crc", "--untagged", "-c", "/tmp/gdfknbzxjf", "-a", "blake2b", "/tmp/vdxwminnue"] Step #5: Rust stderr: Step #5: /tmp/gdfknbzxjf: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/vdxwminnue: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gdfknbzxjf: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/vdxwminnue: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "--untagged", "-c", "/tmp/gdfknbzxjf", "-a", "blake2b", "/tmp/vdxwminnue"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/gscjuwsxvs", "-a", "sha512", "/tmp/iykleyzbtk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/gscjuwsxvs", "-a", "sha512", "/tmp/iykleyzbtk"] Step #5: === Compare result for: cksum ["-c", "/tmp/gscjuwsxvs", "-a", "sha512", "/tmp/iykleyzbtk"] Step #5: Rust stderr: Step #5: /tmp/gscjuwsxvs: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/iykleyzbtk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gscjuwsxvs: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/iykleyzbtk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/gscjuwsxvs", "-a", "sha512", "/tmp/iykleyzbtk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/pygaiezcxj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/pygaiezcxj"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/pygaiezcxj"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/pygaiezcxj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/woaqfpxvps"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/woaqfpxvps"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/woaqfpxvps"] Step #5: Rust stderr: Step #5: /tmp/woaqfpxvps: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/woaqfpxvps: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/woaqfpxvps"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-l", "441", "-c", "/tmp/nserwbozss", "-a", "sha384", "/tmp/wdkiefvwjk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-l", "441", "-c", "/tmp/nserwbozss", "-a", "sha384", "/tmp/wdkiefvwjk"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-l", "441", "-c", "/tmp/nserwbozss", "-a", "sha384", "/tmp/wdkiefvwjk"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-l", "441", "-c", "/tmp/nserwbozss", "-a", "sha384", "/tmp/wdkiefvwjk"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "/tmp/ggfhhrospe", "-a", "sysv", "/tmp/fkpwsgqvsj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "/tmp/ggfhhrospe", "-a", "sysv", "/tmp/fkpwsgqvsj"] Step #5: === Compare result for: cksum ["--text", "-c", "/tmp/ggfhhrospe", "-a", "sysv", "/tmp/fkpwsgqvsj"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "/tmp/ggfhhrospe", "-a", "sysv", "/tmp/fkpwsgqvsj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yalscemmuk", "-a", "bsd", "/tmp/ramxeuyuxo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yalscemmuk", "-a", "bsd", "/tmp/ramxeuyuxo"] Step #5: === Compare result for: cksum ["-c", "/tmp/yalscemmuk", "-a", "bsd", "/tmp/ramxeuyuxo"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yalscemmuk", "-a", "bsd", "/tmp/ramxeuyuxo"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "/tmp/pdwnpqlmjq", "-a", "sysv", "/tmp/teoxfewyyg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "/tmp/pdwnpqlmjq", "-a", "sysv", "/tmp/teoxfewyyg"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "/tmp/pdwnpqlmjq", "-a", "sysv", "/tmp/teoxfewyyg"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "/tmp/pdwnpqlmjq", "-a", "sysv", "/tmp/teoxfewyyg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/nbycwtmtkb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/nbycwtmtkb"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/nbycwtmtkb"] Step #5: Rust stderr: Step #5: /tmp/nbycwtmtkb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/nbycwtmtkb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/nbycwtmtkb"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sysv", "/tmp/thtgojmeor"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sysv", "/tmp/thtgojmeor"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sysv", "/tmp/thtgojmeor"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sysv", "/tmp/thtgojmeor"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "--base64", "-c", "-a", "md5", "/tmp/qownmkzunk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "--base64", "-c", "-a", "md5", "/tmp/qownmkzunk"] Step #5: === Compare result for: cksum ["-a", "bsd", "--base64", "-c", "-a", "md5", "/tmp/qownmkzunk"] Step #5: Rust stderr: Step #5: /tmp/qownmkzunk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qownmkzunk: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "--base64", "-c", "-a", "md5", "/tmp/qownmkzunk"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "/tmp/jwwmhzorqv", "-a", "sha1", "/tmp/ymthoecjaz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "/tmp/jwwmhzorqv", "-a", "sha1", "/tmp/ymthoecjaz"] Step #5: === Compare result for: cksum ["--text", "-c", "/tmp/jwwmhzorqv", "-a", "sha1", "/tmp/ymthoecjaz"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "/tmp/jwwmhzorqv", "-a", "sha1", "/tmp/ymthoecjaz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sha384", "/tmp/mwdvhvpkjx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sha384", "/tmp/mwdvhvpkjx"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sha384", "/tmp/mwdvhvpkjx"] Step #5: Rust stderr: Step #5: /tmp/mwdvhvpkjx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mwdvhvpkjx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sha384", "/tmp/mwdvhvpkjx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "--text", "-c", "-a", "sha512", "/tmp/dpjvkkqozc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "--text", "-c", "-a", "sha512", "/tmp/dpjvkkqozc"] Step #5: === Compare result for: cksum ["-a", "sm3", "--text", "-c", "-a", "sha512", "/tmp/dpjvkkqozc"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "--text", "-c", "-a", "sha512", "/tmp/dpjvkkqozc"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-l", "305", "-c", "-a", "sysv", "/tmp/dnwiqvieib"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-l", "305", "-c", "-a", "sysv", "/tmp/dnwiqvieib"] Step #5: === Compare result for: cksum ["--binary", "-l", "305", "-c", "-a", "sysv", "/tmp/dnwiqvieib"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-l", "305", "-c", "-a", "sysv", "/tmp/dnwiqvieib"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/kimkpbdysl", "-a", "sha384", "/tmp/asyfctckeb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/kimkpbdysl", "-a", "sha384", "/tmp/asyfctckeb"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/kimkpbdysl", "-a", "sha384", "/tmp/asyfctckeb"] Step #5: Rust stderr: Step #5: /tmp/kimkpbdysl: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/asyfctckeb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kimkpbdysl: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/asyfctckeb: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/kimkpbdysl", "-a", "sha384", "/tmp/asyfctckeb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/jhmtaqnmhf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/jhmtaqnmhf"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/jhmtaqnmhf"] Step #5: Rust stderr: Step #5: /tmp/jhmtaqnmhf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jhmtaqnmhf: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/jhmtaqnmhf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/fzzntzjczr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/fzzntzjczr"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/fzzntzjczr"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/fzzntzjczr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/ypmrbtelyr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/ypmrbtelyr"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/ypmrbtelyr"] Step #5: Rust stderr: Step #5: /tmp/ypmrbtelyr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ypmrbtelyr: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/ypmrbtelyr"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "sha224", "/tmp/mdtfcjzbcw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "sha224", "/tmp/mdtfcjzbcw"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "sha224", "/tmp/mdtfcjzbcw"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "sha224", "/tmp/mdtfcjzbcw"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/hdonlmbnzf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/hdonlmbnzf"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/hdonlmbnzf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/hdonlmbnzf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sysv", "/tmp/tgbbndzznz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sysv", "/tmp/tgbbndzznz"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sysv", "/tmp/tgbbndzznz"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sysv", "/tmp/tgbbndzznz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/njrmikrysa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/njrmikrysa"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/njrmikrysa"] Step #5: Rust stderr: Step #5: /tmp/njrmikrysa: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/njrmikrysa: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/njrmikrysa"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/tpyexptftv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/tpyexptftv"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/tpyexptftv"] Step #5: Rust stderr: Step #5: /tmp/tpyexptftv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tpyexptftv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/tpyexptftv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "blake2b", "/tmp/cecbkganyb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "blake2b", "/tmp/cecbkganyb"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "blake2b", "/tmp/cecbkganyb"] Step #5: Rust stderr: Step #5: /tmp/cecbkganyb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cecbkganyb: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "blake2b", "/tmp/cecbkganyb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/pfvjdzkzhq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/pfvjdzkzhq"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/pfvjdzkzhq"] Step #5: Rust stderr: Step #5: /tmp/pfvjdzkzhq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pfvjdzkzhq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/pfvjdzkzhq"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-l", "478", "-c", "-a", "sha256", "/tmp/ruyhvtpntc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-l", "478", "-c", "-a", "sha256", "/tmp/ruyhvtpntc"] Step #5: === Compare result for: cksum ["--text", "-l", "478", "-c", "-a", "sha256", "/tmp/ruyhvtpntc"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-l", "478", "-c", "-a", "sha256", "/tmp/ruyhvtpntc"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "--tag", "-c", "/tmp/wxxgkpzvha", "-a", "blake2b", "/tmp/rjwwyhzyhj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "--tag", "-c", "/tmp/wxxgkpzvha", "-a", "blake2b", "/tmp/rjwwyhzyhj"] Step #5: === Compare result for: cksum ["-a", "sha384", "--tag", "-c", "/tmp/wxxgkpzvha", "-a", "blake2b", "/tmp/rjwwyhzyhj"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "--tag", "-c", "/tmp/wxxgkpzvha", "-a", "blake2b", "/tmp/rjwwyhzyhj"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "43", "-c", "-a", "sha512", "/tmp/pmyywsyadj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "43", "-c", "-a", "sha512", "/tmp/pmyywsyadj"] Step #5: === Compare result for: cksum ["-l", "43", "-c", "-a", "sha512", "/tmp/pmyywsyadj"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "43", "-c", "-a", "sha512", "/tmp/pmyywsyadj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/fxzsvnmyzs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/fxzsvnmyzs"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/fxzsvnmyzs"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/fxzsvnmyzs"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/vnxzcrgfvn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/vnxzcrgfvn"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/vnxzcrgfvn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/vnxzcrgfvn"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "34", "-c", "/tmp/eiyppnqtrk", "-a", "sysv", "/tmp/swiofpdwyz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "34", "-c", "/tmp/eiyppnqtrk", "-a", "sysv", "/tmp/swiofpdwyz"] Step #5: === Compare result for: cksum ["-l", "34", "-c", "/tmp/eiyppnqtrk", "-a", "sysv", "/tmp/swiofpdwyz"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "34", "-c", "/tmp/eiyppnqtrk", "-a", "sysv", "/tmp/swiofpdwyz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/jeugjmpasp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/jeugjmpasp"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/jeugjmpasp"] Step #5: Rust stderr: Step #5: /tmp/jeugjmpasp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jeugjmpasp: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/jeugjmpasp"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "/tmp/matiszcram", "-a", "blake2b", "/tmp/eftofonifc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "/tmp/matiszcram", "-a", "blake2b", "/tmp/eftofonifc"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "/tmp/matiszcram", "-a", "blake2b", "/tmp/eftofonifc"] Step #5: Rust stderr: Step #5: /tmp/matiszcram: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/eftofonifc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/matiszcram: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/eftofonifc: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "/tmp/matiszcram", "-a", "blake2b", "/tmp/eftofonifc"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sha1", "/tmp/ovcfvpznns"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sha1", "/tmp/ovcfvpznns"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sha1", "/tmp/ovcfvpznns"] Step #5: Rust stderr: Step #5: /tmp/ovcfvpznns: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ovcfvpznns: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sha1", "/tmp/ovcfvpznns"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "--text", "-c", "-a", "blake2b", "/tmp/iqvoxdublq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "--text", "-c", "-a", "blake2b", "/tmp/iqvoxdublq"] Step #5: === Compare result for: cksum ["-a", "sha224", "--text", "-c", "-a", "blake2b", "/tmp/iqvoxdublq"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "--text", "-c", "-a", "blake2b", "/tmp/iqvoxdublq"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sm3", "/tmp/txscacpsvc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sm3", "/tmp/txscacpsvc"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sm3", "/tmp/txscacpsvc"] Step #5: Rust stderr: Step #5: /tmp/txscacpsvc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/txscacpsvc: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sm3", "/tmp/txscacpsvc"] Step #5: Step #5: #128 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/zobyzqkunc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/zobyzqkunc"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/zobyzqkunc"] Step #5: Rust stderr: Step #5: /tmp/zobyzqkunc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zobyzqkunc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/zobyzqkunc"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-l", "149", "-c", "-a", "sysv", "/tmp/gjkarfbbca"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-l", "149", "-c", "-a", "sysv", "/tmp/gjkarfbbca"] Step #5: === Compare result for: cksum ["-a", "sm3", "-l", "149", "-c", "-a", "sysv", "/tmp/gjkarfbbca"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-l", "149", "-c", "-a", "sysv", "/tmp/gjkarfbbca"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-l", "334", "file_3", "file_43HÃJ"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-l", "334", "file_3", "file_43HÃJ"] Step #5: === Compare result for: cksum ["-a", "sha224", "-l", "334", "file_3", "file_43HÃJ"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-l", "334", "file_3", "file_43HÃJ"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/kwuzkjglgz", "-a", "sm3", "/tmp/fgfgqpmieq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/kwuzkjglgz", "-a", "sm3", "/tmp/fgfgqpmieq"] Step #5: === Compare result for: cksum ["-c", "/tmp/kwuzkjglgz", "-a", "sm3", "/tmp/fgfgqpmieq"] Step #5: Rust stderr: Step #5: /tmp/kwuzkjglgz: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/fgfgqpmieq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kwuzkjglgz: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/fgfgqpmieq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/kwuzkjglgz", "-a", "sm3", "/tmp/fgfgqpmieq"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "crc", "/tmp/qcyagngioa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "crc", "/tmp/qcyagngioa"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "crc", "/tmp/qcyagngioa"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "crc", "/tmp/qcyagngioa"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "sha512", "/tmp/xstuxgrawy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "sha512", "/tmp/xstuxgrawy"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "sha512", "/tmp/xstuxgrawy"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "sha512", "/tmp/xstuxgrawy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/egosexpofz", "-a", "sha256", "/tmp/zgqeynfzcf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/egosexpofz", "-a", "sha256", "/tmp/zgqeynfzcf"] Step #5: === Compare result for: cksum ["-c", "/tmp/egosexpofz", "-a", "sha256", "/tmp/zgqeynfzcf"] Step #5: Rust stderr: Step #5: /tmp/egosexpofz: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zgqeynfzcf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/egosexpofz: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zgqeynfzcf: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/egosexpofz", "-a", "sha256", "/tmp/zgqeynfzcf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/cuukqdjktk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/cuukqdjktk"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/cuukqdjktk"] Step #5: Rust stderr: Step #5: /tmp/cuukqdjktk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cuukqdjktk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/cuukqdjktk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/xyyhnzhpiy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/xyyhnzhpiy"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/xyyhnzhpiy"] Step #5: Rust stderr: Step #5: /tmp/xyyhnzhpiy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xyyhnzhpiy: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/xyyhnzhpiy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/zffleqytzu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/zffleqytzu"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/zffleqytzu"] Step #5: Rust stderr: Step #5: /tmp/zffleqytzu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zffleqytzu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/zffleqytzu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/jrnyphwueh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/jrnyphwueh"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/jrnyphwueh"] Step #5: Rust stderr: Step #5: /tmp/jrnyphwueh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jrnyphwueh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/jrnyphwueh"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sha384", "/tmp/vicnxnwhna"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sha384", "/tmp/vicnxnwhna"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sha384", "/tmp/vicnxnwhna"] Step #5: Rust stderr: Step #5: /tmp/vicnxnwhna: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vicnxnwhna: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sha384", "/tmp/vicnxnwhna"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "--untagged", "-c", "-a", "sha256", "/tmp/rthdxkymsk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "--untagged", "-c", "-a", "sha256", "/tmp/rthdxkymsk"] Step #5: === Compare result for: cksum ["-a", "crc", "--untagged", "-c", "-a", "sha256", "/tmp/rthdxkymsk"] Step #5: Rust stderr: Step #5: /tmp/rthdxkymsk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rthdxkymsk: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "--untagged", "-c", "-a", "sha256", "/tmp/rthdxkymsk"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sha1", "/tmp/mkdbitborc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sha1", "/tmp/mkdbitborc"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sha1", "/tmp/mkdbitborc"] Step #5: Rust stderr: Step #5: /tmp/mkdbitborc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mkdbitborc: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sha1", "/tmp/mkdbitborc"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/gezhpvmlsf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/gezhpvmlsf"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/gezhpvmlsf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/gezhpvmlsf"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "/tmp/jbkshxaxna", "-a", "sha512", "/tmp/ldrexsnznu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "/tmp/jbkshxaxna", "-a", "sha512", "/tmp/ldrexsnznu"] Step #5: === Compare result for: cksum ["--text", "-c", "/tmp/jbkshxaxna", "-a", "sha512", "/tmp/ldrexsnznu"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "/tmp/jbkshxaxna", "-a", "sha512", "/tmp/ldrexsnznu"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "452", "-c", "-a", "blake2b", "/tmp/peucoepwql"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "452", "-c", "-a", "blake2b", "/tmp/peucoepwql"] Step #5: === Compare result for: cksum ["-l", "452", "-c", "-a", "blake2b", "/tmp/peucoepwql"] Step #5: Rust stderr: Step #5: invalid length: ‘452’ Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: length is not a multiple of 8 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -invalid length: ‘452’ Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: length is not a multiple of 8 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "452", "-c", "-a", "blake2b", "/tmp/peucoepwql"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/vleeswkhvo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/vleeswkhvo"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/vleeswkhvo"] Step #5: Rust stderr: Step #5: /tmp/vleeswkhvo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vleeswkhvo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/vleeswkhvo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/pxbgxpthdg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/pxbgxpthdg"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/pxbgxpthdg"] Step #5: Rust stderr: Step #5: /tmp/pxbgxpthdg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pxbgxpthdg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/pxbgxpthdg"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "-a", "sha256", "/tmp/amfkkhlsqu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "-a", "sha256", "/tmp/amfkkhlsqu"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "-a", "sha256", "/tmp/amfkkhlsqu"] Step #5: Rust stderr: Step #5: /tmp/amfkkhlsqu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/amfkkhlsqu: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "-a", "sha256", "/tmp/amfkkhlsqu"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sha256", "/tmp/oqglotjaoe"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sha256", "/tmp/oqglotjaoe"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sha256", "/tmp/oqglotjaoe"] Step #5: Rust stderr: Step #5: /tmp/oqglotjaoe: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/oqglotjaoe: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sha256", "/tmp/oqglotjaoe"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "/tmp/ugdhrllfxe", "-a", "sm3", "/tmp/ukfbrxanke"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "/tmp/ugdhrllfxe", "-a", "sm3", "/tmp/ukfbrxanke"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "/tmp/ugdhrllfxe", "-a", "sm3", "/tmp/ukfbrxanke"] Step #5: Rust stderr: Step #5: /tmp/ugdhrllfxe: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ukfbrxanke: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ugdhrllfxe: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ukfbrxanke: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "/tmp/ugdhrllfxe", "-a", "sm3", "/tmp/ukfbrxanke"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/yotphxerpe"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/yotphxerpe"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/yotphxerpe"] Step #5: Rust stderr: Step #5: /tmp/yotphxerpe: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yotphxerpe: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/yotphxerpe"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "--tag", "-c", "-a", "sha1", "/tmp/eysezgqabk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "--tag", "-c", "-a", "sha1", "/tmp/eysezgqabk"] Step #5: === Compare result for: cksum ["-a", "sha224", "--tag", "-c", "-a", "sha1", "/tmp/eysezgqabk"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "--tag", "-c", "-a", "sha1", "/tmp/eysezgqabk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/ybtsbdwhzj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/ybtsbdwhzj"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/ybtsbdwhzj"] Step #5: Rust stderr: Step #5: /tmp/ybtsbdwhzj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ybtsbdwhzj: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/ybtsbdwhzj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/xdsimkdsxt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/xdsimkdsxt"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/xdsimkdsxt"] Step #5: Rust stderr: Step #5: /tmp/xdsimkdsxt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xdsimkdsxt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/xdsimkdsxt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/orljmetwec"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/orljmetwec"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/orljmetwec"] Step #5: Rust stderr: Step #5: /tmp/orljmetwec: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/orljmetwec: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/orljmetwec"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "146", "-c", "-a", "sysv", "/tmp/kxmhrptala"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "146", "-c", "-a", "sysv", "/tmp/kxmhrptala"] Step #5: === Compare result for: cksum ["-l", "146", "-c", "-a", "sysv", "/tmp/kxmhrptala"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "146", "-c", "-a", "sysv", "/tmp/kxmhrptala"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sysv", "/tmp/seednfypdl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sysv", "/tmp/seednfypdl"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sysv", "/tmp/seednfypdl"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sysv", "/tmp/seednfypdl"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/kzoqpvsxlv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/kzoqpvsxlv"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/kzoqpvsxlv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/kzoqpvsxlv"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-l", "273", "-c", "-a", "bsd", "/tmp/ckknpaqwea"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-l", "273", "-c", "-a", "bsd", "/tmp/ckknpaqwea"] Step #5: === Compare result for: cksum ["--binary", "-l", "273", "-c", "-a", "bsd", "/tmp/ckknpaqwea"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-l", "273", "-c", "-a", "bsd", "/tmp/ckknpaqwea"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "442", "-c", "-a", "sha512", "/tmp/loizvioydf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "442", "-c", "-a", "sha512", "/tmp/loizvioydf"] Step #5: === Compare result for: cksum ["-l", "442", "-c", "-a", "sha512", "/tmp/loizvioydf"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "442", "-c", "-a", "sha512", "/tmp/loizvioydf"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "blake2b", "/tmp/aplijzlxkt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "blake2b", "/tmp/aplijzlxkt"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "blake2b", "/tmp/aplijzlxkt"] Step #5: Rust stderr: Step #5: /tmp/aplijzlxkt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/aplijzlxkt: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "blake2b", "/tmp/aplijzlxkt"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "blake2b", "/tmp/ggccysbbge"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "blake2b", "/tmp/ggccysbbge"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "blake2b", "/tmp/ggccysbbge"] Step #5: Rust stderr: Step #5: /tmp/ggccysbbge: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ggccysbbge: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "blake2b", "/tmp/ggccysbbge"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "blake2b", "/tmp/rwewxlnenj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "blake2b", "/tmp/rwewxlnenj"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "blake2b", "/tmp/rwewxlnenj"] Step #5: Rust stderr: Step #5: /tmp/rwewxlnenj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rwewxlnenj: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "blake2b", "/tmp/rwewxlnenj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/howrzwjiub"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/howrzwjiub"] Step #5: MERGE-OUTER: attempt 2 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032401401 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/40b5411ba8677f8e049d489f4794fea4a8ed9c98' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 164 processed earlier; will process 261 files now Step #5: === TEST cksum ["cksum", "-a", "sha256", "-l", "106", "-c", "-a", "sha224", "/tmp/kwlsyqpgos"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-l", "106", "-c", "-a", "sha224", "/tmp/kwlsyqpgos"] Step #5: === Compare result for: cksum ["-a", "sha256", "-l", "106", "-c", "-a", "sha224", "/tmp/kwlsyqpgos"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-l", "106", "-c", "-a", "sha224", "/tmp/kwlsyqpgos"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/tusptklhjr", "-a", "sha1", "/tmp/fitwafsxqh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/tusptklhjr", "-a", "sha1", "/tmp/fitwafsxqh"] Step #5: === Compare result for: cksum ["-c", "/tmp/tusptklhjr", "-a", "sha1", "/tmp/fitwafsxqh"] Step #5: Rust stderr: Step #5: /tmp/tusptklhjr: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/fitwafsxqh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tusptklhjr: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/fitwafsxqh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/tusptklhjr", "-a", "sha1", "/tmp/fitwafsxqh"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "md5", "--base64", "-c", "-a", "sha256", "/tmp/kxnvogfdtf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "--base64", "-c", "-a", "sha256", "/tmp/kxnvogfdtf"] Step #5: === Compare result for: cksum ["-a", "md5", "--base64", "-c", "-a", "sha256", "/tmp/kxnvogfdtf"] Step #5: Rust stderr: Step #5: /tmp/kxnvogfdtf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kxnvogfdtf: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "--base64", "-c", "-a", "sha256", "/tmp/kxnvogfdtf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "md5", "/tmp/rikbygouur"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "md5", "/tmp/rikbygouur"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "md5", "/tmp/rikbygouur"] Step #5: Rust stderr: Step #5: /tmp/rikbygouur: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rikbygouur: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "md5", "/tmp/rikbygouur"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/hehqibnztd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/hehqibnztd"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/hehqibnztd"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/hehqibnztd"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "bsd", "/tmp/pagvlvjqxo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "bsd", "/tmp/pagvlvjqxo"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "bsd", "/tmp/pagvlvjqxo"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "bsd", "/tmp/pagvlvjqxo"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "379", "-c", "-a", "crc", "/tmp/vsdlgygekx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "379", "-c", "-a", "crc", "/tmp/vsdlgygekx"] Step #5: === Compare result for: cksum ["-l", "379", "-c", "-a", "crc", "/tmp/vsdlgygekx"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "379", "-c", "-a", "crc", "/tmp/vsdlgygekx"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "bsd", "/tmp/oesokhpuph"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "bsd", "/tmp/oesokhpuph"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "bsd", "/tmp/oesokhpuph"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "bsd", "/tmp/oesokhpuph"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/ijqxydwjlp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/ijqxydwjlp"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/ijqxydwjlp"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/ijqxydwjlp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/pwfittfqse", "-a", "blake2b", "/tmp/rzkiwjyezx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/pwfittfqse", "-a", "blake2b", "/tmp/rzkiwjyezx"] Step #5: === Compare result for: cksum ["-c", "/tmp/pwfittfqse", "-a", "blake2b", "/tmp/rzkiwjyezx"] Step #5: Rust stderr: Step #5: /tmp/pwfittfqse: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/rzkiwjyezx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pwfittfqse: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/rzkiwjyezx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/pwfittfqse", "-a", "blake2b", "/tmp/rzkiwjyezx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/ghuzxgzlbt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/ghuzxgzlbt"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/ghuzxgzlbt"] Step #5: Rust stderr: Step #5: /tmp/ghuzxgzlbt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ghuzxgzlbt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/ghuzxgzlbt"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-l", "263", "-c", "-a", "sm3", "/tmp/lwqhvpevug"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-l", "263", "-c", "-a", "sm3", "/tmp/lwqhvpevug"] Step #5: === Compare result for: cksum ["--binary", "-l", "263", "-c", "-a", "sm3", "/tmp/lwqhvpevug"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-l", "263", "-c", "-a", "sm3", "/tmp/lwqhvpevug"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/apojqcptbr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/apojqcptbr"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/apojqcptbr"] Step #5: Rust stderr: Step #5: /tmp/apojqcptbr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/apojqcptbr: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/apojqcptbr"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "file_QnYÃ"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "file_QnYÃ"] Step #5: === Compare result for: cksum ["-a", "crc", "file_QnYÃ"] Step #5: Rust stderr: Step #5: file_QnYÃ: No such file or directory Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_QnYÃ: No such file or directory Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "file_QnYÃ"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/rjxtlshjaf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/rjxtlshjaf"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/rjxtlshjaf"] Step #5: Rust stderr: Step #5: /tmp/rjxtlshjaf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rjxtlshjaf: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/rjxtlshjaf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/rrdhscygvu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/rrdhscygvu"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/rrdhscygvu"] Step #5: Rust stderr: Step #5: /tmp/rrdhscygvu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rrdhscygvu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/rrdhscygvu"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/ifihsdnyan"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/ifihsdnyan"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/ifihsdnyan"] Step #5: Rust stderr: Step #5: /tmp/ifihsdnyan: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ifihsdnyan: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/ifihsdnyan"] Step #5: Step #5: === TEST cksum ["cksum", "file_vzk(f", "file_G16"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_vzk(f", "file_G16"] Step #5: === Compare result for: cksum ["file_vzk(f", "file_G16"] Step #5: Rust stderr: Step #5: file_vzk(f: No such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: file_G16: No such file or directory Step #5: GNU stderr: Step #5: 'file_vzk(f': No such file or directory Step #5: cksum: file_G16: No such file or directory Step #5: --- START diff Step #5: -file_vzk(f: No such file or directory Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: file_G16: No such file or directory Step #5: +'file_vzk(f': No such file or directory Step #5: +cksum: file_G16: No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["file_vzk(f", "file_G16"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "bsd", "/tmp/onghkpposw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "bsd", "/tmp/onghkpposw"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "bsd", "/tmp/onghkpposw"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "bsd", "/tmp/onghkpposw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/scgmxuzqie"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/scgmxuzqie"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/scgmxuzqie"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/scgmxuzqie"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/cvadwqskpg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/cvadwqskpg"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/cvadwqskpg"] Step #5: Rust stderr: Step #5: /tmp/cvadwqskpg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cvadwqskpg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/cvadwqskpg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/pxqjsfcetw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/pxqjsfcetw"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/pxqjsfcetw"] Step #5: Rust stderr: Step #5: /tmp/pxqjsfcetw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pxqjsfcetw: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/pxqjsfcetw"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "470", "-c", "-a", "sha224", "/tmp/lvaabrrlef"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "470", "-c", "-a", "sha224", "/tmp/lvaabrrlef"] Step #5: === Compare result for: cksum ["-l", "470", "-c", "-a", "sha224", "/tmp/lvaabrrlef"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "470", "-c", "-a", "sha224", "/tmp/lvaabrrlef"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "--raw", "file_islD"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "--raw", "file_islD"] Step #5: === Compare result for: cksum ["-a", "sha224", "--raw", "file_islD"] Step #5: Rust stderr: Step #5: file_islD: No such file or directory Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_islD: No such file or directory Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "--raw", "file_islD"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "sha224", "/tmp/ybinzsmapi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "sha224", "/tmp/ybinzsmapi"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "sha224", "/tmp/ybinzsmapi"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "sha224", "/tmp/ybinzsmapi"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/nrhmhgjami", "-a", "sha384", "/tmp/sxxahixnlt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/nrhmhgjami", "-a", "sha384", "/tmp/sxxahixnlt"] Step #5: === Compare result for: cksum ["-c", "/tmp/nrhmhgjami", "-a", "sha384", "/tmp/sxxahixnlt"] Step #5: Rust stderr: Step #5: /tmp/nrhmhgjami: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/sxxahixnlt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/nrhmhgjami: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/sxxahixnlt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/nrhmhgjami", "-a", "sha384", "/tmp/sxxahixnlt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/vzadurpfru"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/vzadurpfru"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/vzadurpfru"] Step #5: Rust stderr: Step #5: /tmp/vzadurpfru: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vzadurpfru: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/vzadurpfru"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sha384", "/tmp/qdxqnzlaxd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sha384", "/tmp/qdxqnzlaxd"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sha384", "/tmp/qdxqnzlaxd"] Step #5: Rust stderr: Step #5: /tmp/qdxqnzlaxd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qdxqnzlaxd: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sha384", "/tmp/qdxqnzlaxd"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "251", "-c", "/tmp/hdsuxoslgo", "-a", "sha512", "/tmp/dbblvqszrf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "251", "-c", "/tmp/hdsuxoslgo", "-a", "sha512", "/tmp/dbblvqszrf"] Step #5: === Compare result for: cksum ["-l", "251", "-c", "/tmp/hdsuxoslgo", "-a", "sha512", "/tmp/dbblvqszrf"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "251", "-c", "/tmp/hdsuxoslgo", "-a", "sha512", "/tmp/dbblvqszrf"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-l", "33", "-c", "/tmp/spzzfqqzdj", "-a", "sha1", "/tmp/ttgxsyzwsx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-l", "33", "-c", "/tmp/spzzfqqzdj", "-a", "sha1", "/tmp/ttgxsyzwsx"] Step #5: === Compare result for: cksum ["--text", "-l", "33", "-c", "/tmp/spzzfqqzdj", "-a", "sha1", "/tmp/ttgxsyzwsx"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-l", "33", "-c", "/tmp/spzzfqqzdj", "-a", "sha1", "/tmp/ttgxsyzwsx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/weqjfxfmjf", "-a", "sm3", "/tmp/azvxmqfvjh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/weqjfxfmjf", "-a", "sm3", "/tmp/azvxmqfvjh"] Step #5: === Compare result for: cksum ["-c", "/tmp/weqjfxfmjf", "-a", "sm3", "/tmp/azvxmqfvjh"] Step #5: Rust stderr: Step #5: /tmp/weqjfxfmjf: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/azvxmqfvjh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/weqjfxfmjf: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/azvxmqfvjh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/weqjfxfmjf", "-a", "sm3", "/tmp/azvxmqfvjh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/wtityqynrx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/wtityqynrx"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/wtityqynrx"] Step #5: Rust stderr: Step #5: /tmp/wtityqynrx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wtityqynrx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/wtityqynrx"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/mwdqnngzsi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/mwdqnngzsi"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/mwdqnngzsi"] Step #5: Rust stderr: Step #5: /tmp/mwdqnngzsi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mwdqnngzsi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/mwdqnngzsi"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/fpxsfhkblr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/fpxsfhkblr"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/fpxsfhkblr"] Step #5: Rust stderr: Step #5: /tmp/fpxsfhkblr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fpxsfhkblr: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/fpxsfhkblr"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-l", "449", "-c", "/tmp/bjwziusidm", "-a", "sha224", "/tmp/dlrbgfebyi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-l", "449", "-c", "/tmp/bjwziusidm", "-a", "sha224", "/tmp/dlrbgfebyi"] Step #5: === Compare result for: cksum ["--untagged", "-l", "449", "-c", "/tmp/bjwziusidm", "-a", "sha224", "/tmp/dlrbgfebyi"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-l", "449", "-c", "/tmp/bjwziusidm", "-a", "sha224", "/tmp/dlrbgfebyi"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-l", "379", "-c", "-a", "sha256", "/tmp/lahctqwdku"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-l", "379", "-c", "-a", "sha256", "/tmp/lahctqwdku"] Step #5: === Compare result for: cksum ["-a", "sha224", "-l", "379", "-c", "-a", "sha256", "/tmp/lahctqwdku"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-l", "379", "-c", "-a", "sha256", "/tmp/lahctqwdku"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/anqwyplkxt", "-a", "crc", "/tmp/plrywylzua"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/anqwyplkxt", "-a", "crc", "/tmp/plrywylzua"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/anqwyplkxt", "-a", "crc", "/tmp/plrywylzua"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/anqwyplkxt", "-a", "crc", "/tmp/plrywylzua"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sha224", "/tmp/cagjarvwaa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sha224", "/tmp/cagjarvwaa"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sha224", "/tmp/cagjarvwaa"] Step #5: Rust stderr: Step #5: /tmp/cagjarvwaa: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cagjarvwaa: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sha224", "/tmp/cagjarvwaa"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/czxrciusiq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/czxrciusiq"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/czxrciusiq"] Step #5: Rust stderr: Step #5: /tmp/czxrciusiq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/czxrciusiq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/czxrciusiq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/mvdgcqznvb", "-a", "bsd", "/tmp/oqhnjardzc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/mvdgcqznvb", "-a", "bsd", "/tmp/oqhnjardzc"] Step #5: === Compare result for: cksum ["-c", "/tmp/mvdgcqznvb", "-a", "bsd", "/tmp/oqhnjardzc"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/mvdgcqznvb", "-a", "bsd", "/tmp/oqhnjardzc"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "sha256", "/tmp/qkkjoyjfjx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "sha256", "/tmp/qkkjoyjfjx"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "sha256", "/tmp/qkkjoyjfjx"] Step #5: Rust stderr: Step #5: /tmp/qkkjoyjfjx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qkkjoyjfjx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "sha256", "/tmp/qkkjoyjfjx"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/syrkrbefxz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/syrkrbefxz"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/syrkrbefxz"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/syrkrbefxz"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-l", "147", "-c", "-a", "sha1", "/tmp/mvkbcbzdnd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-l", "147", "-c", "-a", "sha1", "/tmp/mvkbcbzdnd"] Step #5: === Compare result for: cksum ["--untagged", "-l", "147", "-c", "-a", "sha1", "/tmp/mvkbcbzdnd"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-l", "147", "-c", "-a", "sha1", "/tmp/mvkbcbzdnd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/ykekzrpsol"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/ykekzrpsol"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/ykekzrpsol"] Step #5: Rust stderr: Step #5: /tmp/ykekzrpsol: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ykekzrpsol: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/ykekzrpsol"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/ptkjasnxai"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/ptkjasnxai"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/ptkjasnxai"] Step #5: Rust stderr: Step #5: /tmp/ptkjasnxai: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ptkjasnxai: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/ptkjasnxai"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/sbktukahmp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/sbktukahmp"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/sbktukahmp"] Step #5: Rust stderr: Step #5: /tmp/sbktukahmp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sbktukahmp: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/sbktukahmp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/tnvpfotizw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/tnvpfotizw"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/tnvpfotizw"] Step #5: Rust stderr: Step #5: /tmp/tnvpfotizw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tnvpfotizw: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/tnvpfotizw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/tyqaartqby"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/tyqaartqby"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/tyqaartqby"] Step #5: Rust stderr: Step #5: /tmp/tyqaartqby: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tyqaartqby: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/tyqaartqby"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "-a", "sha1", "/tmp/hlhczbqpkj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "-a", "sha1", "/tmp/hlhczbqpkj"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "-a", "sha1", "/tmp/hlhczbqpkj"] Step #5: Rust stderr: Step #5: /tmp/hlhczbqpkj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hlhczbqpkj: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "-a", "sha1", "/tmp/hlhczbqpkj"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-a", "md5", "/tmp/ykgqbeuwhm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-a", "md5", "/tmp/ykgqbeuwhm"] Step #5: === Compare result for: cksum ["--raw", "-a", "md5", "/tmp/ykgqbeuwhm"] Step #5: Rust stdout: Step #5: �������vy�+b#�+ Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -�������vy�+b#�+ Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["--raw", "-a", "md5", "/tmp/ykgqbeuwhm"] Step #5: Step #5: thread '' (4937) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["--raw", "-a", "md5", "/tmp/ykgqbeuwhm"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4937== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x81,0x0,0xcd,0xeb,0x23, Step #5: \201\000\315\353# Step #5: artifact_prefix='./'; Test unit written to ./crash-7f93b5db6a62471579800f77df54367c22fd0ffb Step #5: Base64: gQDN6yM= Step #5: MERGE-OUTER: attempt 3 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032628488 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/7f93b5db6a62471579800f77df54367c22fd0ffb' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 214 processed earlier; will process 211 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/qnwpuumujw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/qnwpuumujw"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/qnwpuumujw"] Step #5: Rust stderr: Step #5: /tmp/qnwpuumujw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qnwpuumujw: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/qnwpuumujw"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/govaogphly", "-a", "bsd", "/tmp/khviqbnujc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/govaogphly", "-a", "bsd", "/tmp/khviqbnujc"] Step #5: === Compare result for: cksum ["-c", "/tmp/govaogphly", "-a", "bsd", "/tmp/khviqbnujc"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/govaogphly", "-a", "bsd", "/tmp/khviqbnujc"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "/tmp/sklalpothg", "-a", "md5", "/tmp/zwpkeufhhq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "/tmp/sklalpothg", "-a", "md5", "/tmp/zwpkeufhhq"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "/tmp/sklalpothg", "-a", "md5", "/tmp/zwpkeufhhq"] Step #5: Rust stderr: Step #5: /tmp/sklalpothg: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zwpkeufhhq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sklalpothg: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zwpkeufhhq: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "/tmp/sklalpothg", "-a", "md5", "/tmp/zwpkeufhhq"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-l", "153", "-c", "-a", "sha1", "/tmp/dlmqklxhes"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-l", "153", "-c", "-a", "sha1", "/tmp/dlmqklxhes"] Step #5: === Compare result for: cksum ["-a", "sha512", "-l", "153", "-c", "-a", "sha1", "/tmp/dlmqklxhes"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-l", "153", "-c", "-a", "sha1", "/tmp/dlmqklxhes"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "md5", "/tmp/russewjdlx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "md5", "/tmp/russewjdlx"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "md5", "/tmp/russewjdlx"] Step #5: Rust stderr: Step #5: /tmp/russewjdlx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/russewjdlx: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "md5", "/tmp/russewjdlx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/icpmueteku"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/icpmueteku"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/icpmueteku"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/icpmueteku"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "493", "-c", "-a", "sha224", "/tmp/eghodsosmf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "493", "-c", "-a", "sha224", "/tmp/eghodsosmf"] Step #5: === Compare result for: cksum ["-l", "493", "-c", "-a", "sha224", "/tmp/eghodsosmf"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "493", "-c", "-a", "sha224", "/tmp/eghodsosmf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sm3", "/tmp/fzxtbpjeny"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sm3", "/tmp/fzxtbpjeny"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sm3", "/tmp/fzxtbpjeny"] Step #5: Rust stderr: Step #5: /tmp/fzxtbpjeny: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fzxtbpjeny: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sm3", "/tmp/fzxtbpjeny"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "md5", "-a", "sha512", "/tmp/xmbpcnrjpu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-a", "sha512", "/tmp/xmbpcnrjpu"] Step #5: === Compare result for: cksum ["-a", "md5", "-a", "sha512", "/tmp/xmbpcnrjpu"] Step #5: Rust stdout: Step #5: SHA512 (/tmp/xmbpcnrjpu) = c0f08b3559eb56326dae2005a10cbbe5f1f2c582078a1eb56fa82d28d13e07df7254a5cdb2886f4e382332378de5a5fa96c86e1677ce04ffa4d4713124481ade Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA512 (/tmp/xmbpcnrjpu) = c0f08b3559eb56326dae2005a10cbbe5f1f2c582078a1eb56fa82d28d13e07df7254a5cdb2886f4e382332378de5a5fa96c86e1677ce04ffa4d4713124481ade Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "md5", "-a", "sha512", "/tmp/xmbpcnrjpu"] Step #5: Step #5: thread '' (6276) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "md5", "-a", "sha512", "/tmp/xmbpcnrjpu"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6276== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x64,0x3a,0x32,0x65,0x2b,0xc7, Step #5: d:2e+\307 Step #5: artifact_prefix='./'; Test unit written to ./crash-29cbea1060f03e9211214230bf7d0c6781d90ac3 Step #5: Base64: ZDoyZSvH Step #5: MERGE-OUTER: attempt 4 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032680652 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/29cbea1060f03e9211214230bf7d0c6781d90ac3' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 223 processed earlier; will process 202 files now Step #5: === TEST cksum ["cksum", "-c", "/tmp/icnxqowaui", "-a", "blake2b", "/tmp/rmalxcdvod"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/icnxqowaui", "-a", "blake2b", "/tmp/rmalxcdvod"] Step #5: === Compare result for: cksum ["-c", "/tmp/icnxqowaui", "-a", "blake2b", "/tmp/rmalxcdvod"] Step #5: Rust stderr: Step #5: /tmp/icnxqowaui: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/rmalxcdvod: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/icnxqowaui: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/rmalxcdvod: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/icnxqowaui", "-a", "blake2b", "/tmp/rmalxcdvod"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sha256", "/tmp/mjqkgxhcxs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sha256", "/tmp/mjqkgxhcxs"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sha256", "/tmp/mjqkgxhcxs"] Step #5: Rust stderr: Step #5: /tmp/mjqkgxhcxs: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mjqkgxhcxs: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sha256", "/tmp/mjqkgxhcxs"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/akedspfdde"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/akedspfdde"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/akedspfdde"] Step #5: Rust stderr: Step #5: /tmp/akedspfdde: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/akedspfdde: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/akedspfdde"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "97", "-c", "-a", "bsd", "/tmp/qqhuhjkvtg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "97", "-c", "-a", "bsd", "/tmp/qqhuhjkvtg"] Step #5: === Compare result for: cksum ["-l", "97", "-c", "-a", "bsd", "/tmp/qqhuhjkvtg"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "97", "-c", "-a", "bsd", "/tmp/qqhuhjkvtg"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/yegghebeyk", "-a", "sm3", "/tmp/ahrgcbnzhf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yegghebeyk", "-a", "sm3", "/tmp/ahrgcbnzhf"] Step #5: === Compare result for: cksum ["-c", "/tmp/yegghebeyk", "-a", "sm3", "/tmp/ahrgcbnzhf"] Step #5: Rust stderr: Step #5: /tmp/yegghebeyk: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ahrgcbnzhf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yegghebeyk: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ahrgcbnzhf: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yegghebeyk", "-a", "sm3", "/tmp/ahrgcbnzhf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "--binary", "-c", "/tmp/lqvfxiefjn", "-a", "sha1", "/tmp/zsnpufjfwk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "--binary", "-c", "/tmp/lqvfxiefjn", "-a", "sha1", "/tmp/zsnpufjfwk"] Step #5: === Compare result for: cksum ["-a", "crc", "--binary", "-c", "/tmp/lqvfxiefjn", "-a", "sha1", "/tmp/zsnpufjfwk"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "--binary", "-c", "/tmp/lqvfxiefjn", "-a", "sha1", "/tmp/zsnpufjfwk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/epbudkvlgz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/epbudkvlgz"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/epbudkvlgz"] Step #5: Rust stderr: Step #5: /tmp/epbudkvlgz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/epbudkvlgz: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/epbudkvlgz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/bopotmdhlc", "-a", "bsd", "/tmp/ihkixfhxoe"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/bopotmdhlc", "-a", "bsd", "/tmp/ihkixfhxoe"] Step #5: === Compare result for: cksum ["-c", "/tmp/bopotmdhlc", "-a", "bsd", "/tmp/ihkixfhxoe"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/bopotmdhlc", "-a", "bsd", "/tmp/ihkixfhxoe"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/vbxdysflzn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/vbxdysflzn"] Step #5: MERGE-OUTER: attempt 5 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032730563 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/9dd0b30f836fe181d9b293fe8b1ae3960d406088' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 232 processed earlier; will process 193 files now Step #5: === TEST cksum ["cksum", "-c", "/tmp/pssrhwsacb", "-a", "sm3", "/tmp/mnnlzxcbdj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/pssrhwsacb", "-a", "sm3", "/tmp/mnnlzxcbdj"] Step #5: === Compare result for: cksum ["-c", "/tmp/pssrhwsacb", "-a", "sm3", "/tmp/mnnlzxcbdj"] Step #5: Rust stderr: Step #5: /tmp/pssrhwsacb: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/mnnlzxcbdj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pssrhwsacb: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/mnnlzxcbdj: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/pssrhwsacb", "-a", "sm3", "/tmp/mnnlzxcbdj"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "-a", "sha384", "/tmp/woqmpntpjl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "-a", "sha384", "/tmp/woqmpntpjl"] Step #5: === Compare result for: cksum ["-a", "sha384", "-c", "-a", "sha384", "/tmp/woqmpntpjl"] Step #5: Rust stderr: Step #5: /tmp/woqmpntpjl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/woqmpntpjl: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "-c", "-a", "sha384", "/tmp/woqmpntpjl"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/qtxeccwddm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/qtxeccwddm"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/qtxeccwddm"] Step #5: Rust stderr: Step #5: /tmp/qtxeccwddm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qtxeccwddm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/qtxeccwddm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/crnkvpgpiw", "-a", "crc", "/tmp/qvkcttatsi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/crnkvpgpiw", "-a", "crc", "/tmp/qvkcttatsi"] Step #5: === Compare result for: cksum ["-c", "/tmp/crnkvpgpiw", "-a", "crc", "/tmp/qvkcttatsi"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/crnkvpgpiw", "-a", "crc", "/tmp/qvkcttatsi"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/csgzpkcnkn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/csgzpkcnkn"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/csgzpkcnkn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/csgzpkcnkn"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha384", "/tmp/splwvvazwh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha384", "/tmp/splwvvazwh"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha384", "/tmp/splwvvazwh"] Step #5: Rust stderr: Step #5: /tmp/splwvvazwh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/splwvvazwh: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha384", "/tmp/splwvvazwh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/ofgyhltfia"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/ofgyhltfia"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/ofgyhltfia"] Step #5: Rust stderr: Step #5: /tmp/ofgyhltfia: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ofgyhltfia: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/ofgyhltfia"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "/tmp/sxvanolbek", "-a", "sha512", "/tmp/qzamxbuzdj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "/tmp/sxvanolbek", "-a", "sha512", "/tmp/qzamxbuzdj"] Step #5: === Compare result for: cksum ["--binary", "-c", "/tmp/sxvanolbek", "-a", "sha512", "/tmp/qzamxbuzdj"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "/tmp/sxvanolbek", "-a", "sha512", "/tmp/qzamxbuzdj"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/xrsdkshcvd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/xrsdkshcvd"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/xrsdkshcvd"] Step #5: Rust stderr: Step #5: /tmp/xrsdkshcvd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xrsdkshcvd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/xrsdkshcvd"] Step #5: Step #5: === TEST cksum ["cksum", "file_d3I"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_d3I"] Step #5: === Compare result for: cksum ["file_d3I"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "md5", "/tmp/mrocnesoqq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "md5", "/tmp/mrocnesoqq"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "md5", "/tmp/mrocnesoqq"] Step #5: Rust stderr: Step #5: /tmp/mrocnesoqq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mrocnesoqq: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "md5", "/tmp/mrocnesoqq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/dpdqwmyuae"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/dpdqwmyuae"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/dpdqwmyuae"] Step #5: Rust stderr: Step #5: /tmp/dpdqwmyuae: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dpdqwmyuae: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/dpdqwmyuae"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "--raw", "-c", "/tmp/aigjjxdlug", "-a", "blake2b", "/tmp/qdwlenwiae"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "--raw", "-c", "/tmp/aigjjxdlug", "-a", "blake2b", "/tmp/qdwlenwiae"] Step #5: === Compare result for: cksum ["-a", "sha1", "--raw", "-c", "/tmp/aigjjxdlug", "-a", "blake2b", "/tmp/qdwlenwiae"] Step #5: Rust stderr: Step #5: /tmp/aigjjxdlug: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/qdwlenwiae: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/aigjjxdlug: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/qdwlenwiae: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "--raw", "-c", "/tmp/aigjjxdlug", "-a", "blake2b", "/tmp/qdwlenwiae"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/ngnvnlawmg", "-a", "sysv", "/tmp/ygsqfpkqnh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/ngnvnlawmg", "-a", "sysv", "/tmp/ygsqfpkqnh"] Step #5: === Compare result for: cksum ["-c", "/tmp/ngnvnlawmg", "-a", "sysv", "/tmp/ygsqfpkqnh"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/ngnvnlawmg", "-a", "sysv", "/tmp/ygsqfpkqnh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/vuppqttofw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/vuppqttofw"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/vuppqttofw"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/vuppqttofw"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha384", "/tmp/dblekczjna"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha384", "/tmp/dblekczjna"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha384", "/tmp/dblekczjna"] Step #5: Rust stderr: Step #5: /tmp/dblekczjna: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dblekczjna: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha384", "/tmp/dblekczjna"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--tag", "file_("] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "file_("] Step #5: === Compare result for: cksum ["--tag", "file_("] Step #5: Rust stderr: Step #5: file_(: No such file or directory Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_(: No such file or directory Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "file_("] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "/tmp/heuiawcduu", "-a", "md5", "/tmp/wnkkkdfxri"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "/tmp/heuiawcduu", "-a", "md5", "/tmp/wnkkkdfxri"] Step #5: === Compare result for: cksum ["--text", "-c", "/tmp/heuiawcduu", "-a", "md5", "/tmp/wnkkkdfxri"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "/tmp/heuiawcduu", "-a", "md5", "/tmp/wnkkkdfxri"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/gdnpaossgt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/gdnpaossgt"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/gdnpaossgt"] Step #5: Rust stderr: Step #5: /tmp/gdnpaossgt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gdnpaossgt: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/gdnpaossgt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/lohcwnonxt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/lohcwnonxt"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/lohcwnonxt"] Step #5: Rust stderr: Step #5: /tmp/lohcwnonxt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lohcwnonxt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/lohcwnonxt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/sjzknerxua"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/sjzknerxua"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/sjzknerxua"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/sjzknerxua"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/vosamsecyj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/vosamsecyj"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/vosamsecyj"] Step #5: Rust stderr: Step #5: /tmp/vosamsecyj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vosamsecyj: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/vosamsecyj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "bsd", "/tmp/weugkobsoi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "bsd", "/tmp/weugkobsoi"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "bsd", "/tmp/weugkobsoi"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "bsd", "/tmp/weugkobsoi"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "/tmp/lptyidgjlj", "-a", "md5", "/tmp/ermpzunjrv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "/tmp/lptyidgjlj", "-a", "md5", "/tmp/ermpzunjrv"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "/tmp/lptyidgjlj", "-a", "md5", "/tmp/ermpzunjrv"] Step #5: Rust stderr: Step #5: /tmp/lptyidgjlj: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ermpzunjrv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lptyidgjlj: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ermpzunjrv: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "/tmp/lptyidgjlj", "-a", "md5", "/tmp/ermpzunjrv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "/tmp/mofykqavmg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "/tmp/mofykqavmg"] Step #5: === Compare result for: cksum ["-a", "sha512", "/tmp/mofykqavmg"] Step #5: Rust stdout: Step #5: SHA512 (/tmp/mofykqavmg) = 02ea15869abec2914fcffe0ba5047566ef94806da8d40a1308a0f802f12db88776b8f666799a4fb55277ee81fb0ff71ed5d8efe93b728ad7b3ecacd22bd3c81b Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA512 (/tmp/mofykqavmg) = 02ea15869abec2914fcffe0ba5047566ef94806da8d40a1308a0f802f12db88776b8f666799a4fb55277ee81fb0ff71ed5d8efe93b728ad7b3ecacd22bd3c81b Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sha512", "/tmp/mofykqavmg"] Step #5: Step #5: thread '' (6795) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sha512", "/tmp/mofykqavmg"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6795== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x3a,0x31,0x3a,0x22,0x5c,0xb8, Step #5: S:1:\"\\\270 Step #5: artifact_prefix='./'; Test unit written to ./crash-314d316ae02b467748d11828f64e09c995e5e0d0 Step #5: Base64: UzoxOiJcuA== Step #5: MERGE-OUTER: attempt 6 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032839388 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/314d316ae02b467748d11828f64e09c995e5e0d0' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 257 processed earlier; will process 168 files now Step #5: === TEST cksum ["cksum", "-l", "272", "-c", "-a", "crc", "/tmp/jxylvoknpo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "272", "-c", "-a", "crc", "/tmp/jxylvoknpo"] Step #5: === Compare result for: cksum ["-l", "272", "-c", "-a", "crc", "/tmp/jxylvoknpo"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "272", "-c", "-a", "crc", "/tmp/jxylvoknpo"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/qtlrabkbad", "-a", "sha384", "/tmp/gziesujyxk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/qtlrabkbad", "-a", "sha384", "/tmp/gziesujyxk"] Step #5: === Compare result for: cksum ["-c", "/tmp/qtlrabkbad", "-a", "sha384", "/tmp/gziesujyxk"] Step #5: Rust stderr: Step #5: /tmp/qtlrabkbad: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/gziesujyxk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qtlrabkbad: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/gziesujyxk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/qtlrabkbad", "-a", "sha384", "/tmp/gziesujyxk"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "310", "-c", "/tmp/ohzkdzjejh", "-a", "sm3", "/tmp/eotzqhgems"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "310", "-c", "/tmp/ohzkdzjejh", "-a", "sm3", "/tmp/eotzqhgems"] Step #5: === Compare result for: cksum ["-l", "310", "-c", "/tmp/ohzkdzjejh", "-a", "sm3", "/tmp/eotzqhgems"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "310", "-c", "/tmp/ohzkdzjejh", "-a", "sm3", "/tmp/eotzqhgems"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/ygykbvbmwi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/ygykbvbmwi"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/ygykbvbmwi"] Step #5: Rust stderr: Step #5: /tmp/ygykbvbmwi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ygykbvbmwi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/ygykbvbmwi"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--base64", "-l", "313", "-c", "-a", "md5", "/tmp/dxzfjcoumb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-l", "313", "-c", "-a", "md5", "/tmp/dxzfjcoumb"] Step #5: === Compare result for: cksum ["--base64", "-l", "313", "-c", "-a", "md5", "/tmp/dxzfjcoumb"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-l", "313", "-c", "-a", "md5", "/tmp/dxzfjcoumb"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "bsd", "/tmp/shcuhqhsss"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "bsd", "/tmp/shcuhqhsss"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "bsd", "/tmp/shcuhqhsss"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "bsd", "/tmp/shcuhqhsss"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sm3", "/tmp/yvfcfyhdya"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sm3", "/tmp/yvfcfyhdya"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sm3", "/tmp/yvfcfyhdya"] Step #5: Rust stderr: Step #5: /tmp/yvfcfyhdya: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yvfcfyhdya: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sm3", "/tmp/yvfcfyhdya"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha224", "/tmp/oyztfyzayq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha224", "/tmp/oyztfyzayq"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha224", "/tmp/oyztfyzayq"] Step #5: Rust stderr: Step #5: /tmp/oyztfyzayq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/oyztfyzayq: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha224", "/tmp/oyztfyzayq"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--tag", "-c", "/tmp/sefvrpmcti", "-a", "sha384", "/tmp/henmdlgujn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "/tmp/sefvrpmcti", "-a", "sha384", "/tmp/henmdlgujn"] Step #5: === Compare result for: cksum ["--tag", "-c", "/tmp/sefvrpmcti", "-a", "sha384", "/tmp/henmdlgujn"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "/tmp/sefvrpmcti", "-a", "sha384", "/tmp/henmdlgujn"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "288", "-c", "-a", "bsd", "/tmp/uhxmfmbrft"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "288", "-c", "-a", "bsd", "/tmp/uhxmfmbrft"] Step #5: === Compare result for: cksum ["-l", "288", "-c", "-a", "bsd", "/tmp/uhxmfmbrft"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "288", "-c", "-a", "bsd", "/tmp/uhxmfmbrft"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/flnfzgpylu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/flnfzgpylu"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/flnfzgpylu"] Step #5: Rust stderr: Step #5: /tmp/flnfzgpylu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/flnfzgpylu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/flnfzgpylu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/upbtycokam"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/upbtycokam"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/upbtycokam"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/upbtycokam"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha224", "/tmp/qfyhzaxhrx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha224", "/tmp/qfyhzaxhrx"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha224", "/tmp/qfyhzaxhrx"] Step #5: Rust stderr: Step #5: /tmp/qfyhzaxhrx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qfyhzaxhrx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha224", "/tmp/qfyhzaxhrx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/lldyudlkfk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/lldyudlkfk"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/lldyudlkfk"] Step #5: Rust stderr: Step #5: /tmp/lldyudlkfk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lldyudlkfk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/lldyudlkfk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/lbmhdemjiu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/lbmhdemjiu"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/lbmhdemjiu"] Step #5: Rust stderr: Step #5: /tmp/lbmhdemjiu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lbmhdemjiu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/lbmhdemjiu"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "56", "-c", "/tmp/ixrdircbtu", "-a", "sha1", "/tmp/fzuebkhrzx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "56", "-c", "/tmp/ixrdircbtu", "-a", "sha1", "/tmp/fzuebkhrzx"] Step #5: === Compare result for: cksum ["-l", "56", "-c", "/tmp/ixrdircbtu", "-a", "sha1", "/tmp/fzuebkhrzx"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "56", "-c", "/tmp/ixrdircbtu", "-a", "sha1", "/tmp/fzuebkhrzx"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/zuasedpgkv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/zuasedpgkv"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/zuasedpgkv"] Step #5: Rust stderr: Step #5: /tmp/zuasedpgkv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zuasedpgkv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/zuasedpgkv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yqtfijlhrs", "-a", "sha384", "/tmp/subtsklxvq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yqtfijlhrs", "-a", "sha384", "/tmp/subtsklxvq"] Step #5: === Compare result for: cksum ["-c", "/tmp/yqtfijlhrs", "-a", "sha384", "/tmp/subtsklxvq"] Step #5: Rust stderr: Step #5: /tmp/yqtfijlhrs: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/subtsklxvq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yqtfijlhrs: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/subtsklxvq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yqtfijlhrs", "-a", "sha384", "/tmp/subtsklxvq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/oijolzlold", "-a", "sysv", "/tmp/qdwtbvwqmf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/oijolzlold", "-a", "sysv", "/tmp/qdwtbvwqmf"] Step #5: === Compare result for: cksum ["-c", "/tmp/oijolzlold", "-a", "sysv", "/tmp/qdwtbvwqmf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/oijolzlold", "-a", "sysv", "/tmp/qdwtbvwqmf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "-a", "sha1", "/tmp/fztvvfraxl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "-a", "sha1", "/tmp/fztvvfraxl"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "-a", "sha1", "/tmp/fztvvfraxl"] Step #5: Rust stderr: Step #5: /tmp/fztvvfraxl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fztvvfraxl: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "-a", "sha1", "/tmp/fztvvfraxl"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha1", "/tmp/fhzcphgvua"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha1", "/tmp/fhzcphgvua"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha1", "/tmp/fhzcphgvua"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha1", "/tmp/fhzcphgvua"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "sha224", "/tmp/gkxyljqnfh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "sha224", "/tmp/gkxyljqnfh"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "sha224", "/tmp/gkxyljqnfh"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "sha224", "/tmp/gkxyljqnfh"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-a", "sha256", "/tmp/muiljdcbav"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-a", "sha256", "/tmp/muiljdcbav"] Step #5: === Compare result for: cksum ["--untagged", "-a", "sha256", "/tmp/muiljdcbav"] Step #5: Rust stdout: Step #5: SHA256 (/tmp/muiljdcbav) = 11e41551d02886b86749abc4af37e4d2656ff71c4ca3963902f4c0f5847fb654 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA256 (/tmp/muiljdcbav) = 11e41551d02886b86749abc4af37e4d2656ff71c4ca3963902f4c0f5847fb654 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["--untagged", "-a", "sha256", "/tmp/muiljdcbav"] Step #5: Step #5: thread '' (7457) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["--untagged", "-a", "sha256", "/tmp/muiljdcbav"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7457== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x8b,0x2,0xcf,0xff,0xff,0xff,0xfd,0xfd,0xff,0xff,0xff, Step #5: \213\002\317\377\377\377\375\375\377\377\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-d93fb98bf093b5ba087352151ec76edf46c46c1a Step #5: Base64: iwLP/////f3///8= Step #5: MERGE-OUTER: attempt 7 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032947999 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/d93fb98bf093b5ba087352151ec76edf46c46c1a' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 280 processed earlier; will process 145 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/itmehhtsbm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/itmehhtsbm"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/itmehhtsbm"] Step #5: Rust stderr: Step #5: /tmp/itmehhtsbm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/itmehhtsbm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/itmehhtsbm"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/cgnptwpclo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/cgnptwpclo"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/cgnptwpclo"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/cgnptwpclo"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/guwgtylgni"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/guwgtylgni"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/guwgtylgni"] Step #5: Rust stderr: Step #5: /tmp/guwgtylgni: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/guwgtylgni: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/guwgtylgni"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha512", "/tmp/vhjjiusryj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha512", "/tmp/vhjjiusryj"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha512", "/tmp/vhjjiusryj"] Step #5: Rust stderr: Step #5: /tmp/vhjjiusryj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vhjjiusryj: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha512", "/tmp/vhjjiusryj"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--base64", "-c", "/tmp/kisqnqomlu", "-a", "sm3", "/tmp/cfxbmnuphr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "/tmp/kisqnqomlu", "-a", "sm3", "/tmp/cfxbmnuphr"] Step #5: === Compare result for: cksum ["--base64", "-c", "/tmp/kisqnqomlu", "-a", "sm3", "/tmp/cfxbmnuphr"] Step #5: Rust stderr: Step #5: /tmp/kisqnqomlu: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/cfxbmnuphr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kisqnqomlu: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/cfxbmnuphr: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "/tmp/kisqnqomlu", "-a", "sm3", "/tmp/cfxbmnuphr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/djtjibpqxh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/djtjibpqxh"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/djtjibpqxh"] Step #5: Rust stderr: Step #5: /tmp/djtjibpqxh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/djtjibpqxh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/djtjibpqxh"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "md5", "/tmp/vqwxdsouam"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "md5", "/tmp/vqwxdsouam"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "md5", "/tmp/vqwxdsouam"] Step #5: Rust stderr: Step #5: /tmp/vqwxdsouam: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vqwxdsouam: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "md5", "/tmp/vqwxdsouam"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "bsd", "/tmp/bflolwoayd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "bsd", "/tmp/bflolwoayd"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "bsd", "/tmp/bflolwoayd"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "bsd", "/tmp/bflolwoayd"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/pyezirxtzv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/pyezirxtzv"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/pyezirxtzv"] Step #5: Rust stderr: Step #5: /tmp/pyezirxtzv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pyezirxtzv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/pyezirxtzv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/iufgikmyas"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/iufgikmyas"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/iufgikmyas"] Step #5: Rust stderr: Step #5: /tmp/iufgikmyas: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/iufgikmyas: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/iufgikmyas"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/uxufoffyco"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/uxufoffyco"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/uxufoffyco"] Step #5: Rust stderr: Step #5: /tmp/uxufoffyco: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uxufoffyco: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/uxufoffyco"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "sha384", "/tmp/zbapjeomon"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "sha384", "/tmp/zbapjeomon"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "sha384", "/tmp/zbapjeomon"] Step #5: Rust stderr: Step #5: /tmp/zbapjeomon: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zbapjeomon: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "sha384", "/tmp/zbapjeomon"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "/tmp/tmnkcvkvxk", "-a", "blake2b", "/tmp/zxvbzybqyo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "/tmp/tmnkcvkvxk", "-a", "blake2b", "/tmp/zxvbzybqyo"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "/tmp/tmnkcvkvxk", "-a", "blake2b", "/tmp/zxvbzybqyo"] Step #5: Rust stderr: Step #5: /tmp/tmnkcvkvxk: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zxvbzybqyo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tmnkcvkvxk: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/zxvbzybqyo: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "/tmp/tmnkcvkvxk", "-a", "blake2b", "/tmp/zxvbzybqyo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/jmycsgezhw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/jmycsgezhw"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/jmycsgezhw"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/jmycsgezhw"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "md5", "/tmp/vxthoshugr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "md5", "/tmp/vxthoshugr"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "md5", "/tmp/vxthoshugr"] Step #5: Rust stderr: Step #5: /tmp/vxthoshugr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vxthoshugr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "md5", "/tmp/vxthoshugr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/hqdinzpdih"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/hqdinzpdih"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/hqdinzpdih"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/hqdinzpdih"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/fuhbaijwcl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/fuhbaijwcl"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/fuhbaijwcl"] Step #5: Rust stderr: Step #5: /tmp/fuhbaijwcl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fuhbaijwcl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/fuhbaijwcl"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "sha1", "/tmp/eoffawixef"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "sha1", "/tmp/eoffawixef"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "sha1", "/tmp/eoffawixef"] Step #5: Rust stderr: Step #5: /tmp/eoffawixef: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eoffawixef: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "sha1", "/tmp/eoffawixef"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/pokbhvbtsf", "-a", "sha256", "/tmp/kvjorkfiay"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/pokbhvbtsf", "-a", "sha256", "/tmp/kvjorkfiay"] Step #5: === Compare result for: cksum ["-c", "/tmp/pokbhvbtsf", "-a", "sha256", "/tmp/kvjorkfiay"] Step #5: Rust stderr: Step #5: /tmp/pokbhvbtsf: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/kvjorkfiay: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pokbhvbtsf: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/kvjorkfiay: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/pokbhvbtsf", "-a", "sha256", "/tmp/kvjorkfiay"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/okaaikyrmg", "-a", "sysv", "/tmp/tkfeknlkym"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/okaaikyrmg", "-a", "sysv", "/tmp/tkfeknlkym"] Step #5: === Compare result for: cksum ["-c", "/tmp/okaaikyrmg", "-a", "sysv", "/tmp/tkfeknlkym"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/okaaikyrmg", "-a", "sysv", "/tmp/tkfeknlkym"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/xxnrmcfgld"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/xxnrmcfgld"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/xxnrmcfgld"] Step #5: Rust stderr: Step #5: /tmp/xxnrmcfgld: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xxnrmcfgld: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/xxnrmcfgld"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/xubnupktcp", "-a", "sha256", "/tmp/xeujilfnkh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/xubnupktcp", "-a", "sha256", "/tmp/xeujilfnkh"] Step #5: === Compare result for: cksum ["-c", "/tmp/xubnupktcp", "-a", "sha256", "/tmp/xeujilfnkh"] Step #5: Rust stderr: Step #5: /tmp/xubnupktcp: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/xeujilfnkh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xubnupktcp: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/xeujilfnkh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/xubnupktcp", "-a", "sha256", "/tmp/xeujilfnkh"] Step #5: Step #5: === TEST cksum ["cksum", "file_D"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_D"] Step #5: === Compare result for: cksum ["file_D"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/oltudzmtng"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/oltudzmtng"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/oltudzmtng"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/oltudzmtng"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "-a", "sha1", "/tmp/cfaxboswer"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "-a", "sha1", "/tmp/cfaxboswer"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "-a", "sha1", "/tmp/cfaxboswer"] Step #5: Rust stderr: Step #5: /tmp/cfaxboswer: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cfaxboswer: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "-a", "sha1", "/tmp/cfaxboswer"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "195", "-c", "-a", "sha512", "/tmp/vnpeydtauj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "195", "-c", "-a", "sha512", "/tmp/vnpeydtauj"] Step #5: === Compare result for: cksum ["-l", "195", "-c", "-a", "sha512", "/tmp/vnpeydtauj"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "195", "-c", "-a", "sha512", "/tmp/vnpeydtauj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "/tmp/mjfgywdlmt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "/tmp/mjfgywdlmt"] Step #5: === Compare result for: cksum ["-a", "sha384", "/tmp/mjfgywdlmt"] Step #5: Rust stdout: Step #5: SHA384 (/tmp/mjfgywdlmt) = 10ab612013c72e000c8e5ac622aaf8fc4e4bd84f18dab1f7b68d265d876d38894ca73f287f89f8cb852a1f0c911585d7 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA384 (/tmp/mjfgywdlmt) = 10ab612013c72e000c8e5ac622aaf8fc4e4bd84f18dab1f7b68d265d876d38894ca73f287f89f8cb852a1f0c911585d7 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sha384", "/tmp/mjfgywdlmt"] Step #5: Step #5: thread '' (7910) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sha384", "/tmp/mjfgywdlmt"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7910== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x3a,0x31,0x31,0x3a,0x22,0x41,0x72,0x72,0x61,0x79,0x4f,0x62,0x6a,0x31,0x30,0x3b,0x22,0x3a, Step #5: C:11:\"ArrayObj10;\": Step #5: artifact_prefix='./'; Test unit written to ./crash-e34119804b90929ef7d1623a0435a3adfe40afe2 Step #5: Base64: QzoxMToiQXJyYXlPYmoxMDsiOg== Step #5: MERGE-OUTER: attempt 8 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033064571 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/e34119804b90929ef7d1623a0435a3adfe40afe2' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 307 processed earlier; will process 118 files now Step #5: === TEST cksum ["cksum", "--tag", "-c", "/tmp/edpcozrtvx", "-a", "blake2b", "/tmp/ufmfoqzbpj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "/tmp/edpcozrtvx", "-a", "blake2b", "/tmp/ufmfoqzbpj"] Step #5: === Compare result for: cksum ["--tag", "-c", "/tmp/edpcozrtvx", "-a", "blake2b", "/tmp/ufmfoqzbpj"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "/tmp/edpcozrtvx", "-a", "blake2b", "/tmp/ufmfoqzbpj"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "sha512", "/tmp/iwusaachfx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "sha512", "/tmp/iwusaachfx"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "sha512", "/tmp/iwusaachfx"] Step #5: Rust stderr: Step #5: /tmp/iwusaachfx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/iwusaachfx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "sha512", "/tmp/iwusaachfx"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "crc", "file_8Ã🔩", "file_"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "file_8Ã🔩", "file_"] Step #5: === Compare result for: cksum ["-a", "crc", "file_8Ã🔩", "file_"] Step #5: Rust stderr: Step #5: file_8Ã🔩: No such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: file_: No such file or directory Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_8Ã🔩: No such file or directory Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: file_: No such file or directory Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "file_8Ã🔩", "file_"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "md5", "/tmp/cewbuqkbln"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "md5", "/tmp/cewbuqkbln"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "md5", "/tmp/cewbuqkbln"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "md5", "/tmp/cewbuqkbln"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/aevmjidsgr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/aevmjidsgr"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/aevmjidsgr"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/aevmjidsgr"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha512", "/tmp/tzojbtduud"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha512", "/tmp/tzojbtduud"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha512", "/tmp/tzojbtduud"] Step #5: Rust stderr: Step #5: /tmp/tzojbtduud: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tzojbtduud: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha512", "/tmp/tzojbtduud"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/npjwbgulbx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/npjwbgulbx"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/npjwbgulbx"] Step #5: Rust stderr: Step #5: /tmp/npjwbgulbx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/npjwbgulbx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/npjwbgulbx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sha1", "/tmp/lwsvbmqwjs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sha1", "/tmp/lwsvbmqwjs"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sha1", "/tmp/lwsvbmqwjs"] Step #5: Rust stderr: Step #5: /tmp/lwsvbmqwjs: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lwsvbmqwjs: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sha1", "/tmp/lwsvbmqwjs"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sha256", "/tmp/wgxcduswop"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sha256", "/tmp/wgxcduswop"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sha256", "/tmp/wgxcduswop"] Step #5: Rust stderr: Step #5: /tmp/wgxcduswop: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wgxcduswop: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sha256", "/tmp/wgxcduswop"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "file_"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "file_"] Step #5: === Compare result for: cksum ["-a", "sysv", "file_"] Step #5: Rust stderr: Step #5: file_: No such file or directory Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_: No such file or directory Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "file_"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "/tmp/jydcynzfct", "-a", "md5", "/tmp/dlobxvdtvc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "/tmp/jydcynzfct", "-a", "md5", "/tmp/dlobxvdtvc"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "/tmp/jydcynzfct", "-a", "md5", "/tmp/dlobxvdtvc"] Step #5: Rust stderr: Step #5: /tmp/jydcynzfct: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/dlobxvdtvc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jydcynzfct: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/dlobxvdtvc: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "/tmp/jydcynzfct", "-a", "md5", "/tmp/dlobxvdtvc"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "418", "-c", "-a", "crc", "/tmp/oivszcgpxm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "418", "-c", "-a", "crc", "/tmp/oivszcgpxm"] Step #5: === Compare result for: cksum ["-l", "418", "-c", "-a", "crc", "/tmp/oivszcgpxm"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "418", "-c", "-a", "crc", "/tmp/oivszcgpxm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/ykulygdiyk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/ykulygdiyk"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/ykulygdiyk"] Step #5: Rust stderr: Step #5: /tmp/ykulygdiyk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ykulygdiyk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/ykulygdiyk"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "sha512", "/tmp/oikwgidlvm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "sha512", "/tmp/oikwgidlvm"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "sha512", "/tmp/oikwgidlvm"] Step #5: Rust stderr: Step #5: /tmp/oikwgidlvm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/oikwgidlvm: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "sha512", "/tmp/oikwgidlvm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/zujkajacot", "-a", "sha384", "/tmp/hxnpyoeggb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/zujkajacot", "-a", "sha384", "/tmp/hxnpyoeggb"] Step #5: === Compare result for: cksum ["-c", "/tmp/zujkajacot", "-a", "sha384", "/tmp/hxnpyoeggb"] Step #5: Rust stderr: Step #5: /tmp/zujkajacot: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/hxnpyoeggb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zujkajacot: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/hxnpyoeggb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/zujkajacot", "-a", "sha384", "/tmp/hxnpyoeggb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/dhobsuoake"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/dhobsuoake"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/dhobsuoake"] Step #5: Rust stderr: Step #5: /tmp/dhobsuoake: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dhobsuoake: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/dhobsuoake"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/atkhlkhrug", "-a", "sha384", "/tmp/ipgsahsnft"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/atkhlkhrug", "-a", "sha384", "/tmp/ipgsahsnft"] Step #5: === Compare result for: cksum ["-c", "/tmp/atkhlkhrug", "-a", "sha384", "/tmp/ipgsahsnft"] Step #5: Rust stderr: Step #5: /tmp/atkhlkhrug: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ipgsahsnft: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/atkhlkhrug: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ipgsahsnft: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/atkhlkhrug", "-a", "sha384", "/tmp/ipgsahsnft"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/powbjgrjyn", "-a", "sm3", "/tmp/dmcqzdwsxf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/powbjgrjyn", "-a", "sm3", "/tmp/dmcqzdwsxf"] Step #5: === Compare result for: cksum ["-c", "/tmp/powbjgrjyn", "-a", "sm3", "/tmp/dmcqzdwsxf"] Step #5: Rust stderr: Step #5: /tmp/powbjgrjyn: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/dmcqzdwsxf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/powbjgrjyn: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/dmcqzdwsxf: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/powbjgrjyn", "-a", "sm3", "/tmp/dmcqzdwsxf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/buffdshjbc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/buffdshjbc"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/buffdshjbc"] Step #5: Rust stderr: Step #5: /tmp/buffdshjbc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/buffdshjbc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/buffdshjbc"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "/tmp/wljlzhdubv", "-a", "crc", "/tmp/ssejgcgdkm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "/tmp/wljlzhdubv", "-a", "crc", "/tmp/ssejgcgdkm"] Step #5: === Compare result for: cksum ["--text", "-c", "/tmp/wljlzhdubv", "-a", "crc", "/tmp/ssejgcgdkm"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "/tmp/wljlzhdubv", "-a", "crc", "/tmp/ssejgcgdkm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/zzjeykzwyl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/zzjeykzwyl"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/zzjeykzwyl"] Step #5: Rust stderr: Step #5: /tmp/zzjeykzwyl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zzjeykzwyl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/zzjeykzwyl"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "--base64", "-c", "-a", "blake2b", "/tmp/kpurgeozkg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "--base64", "-c", "-a", "blake2b", "/tmp/kpurgeozkg"] Step #5: === Compare result for: cksum ["-a", "bsd", "--base64", "-c", "-a", "blake2b", "/tmp/kpurgeozkg"] Step #5: Rust stderr: Step #5: /tmp/kpurgeozkg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kpurgeozkg: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "--base64", "-c", "-a", "blake2b", "/tmp/kpurgeozkg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/mcmjzbsyvz", "-a", "sysv", "/tmp/jptahijlmv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/mcmjzbsyvz", "-a", "sysv", "/tmp/jptahijlmv"] Step #5: === Compare result for: cksum ["-c", "/tmp/mcmjzbsyvz", "-a", "sysv", "/tmp/jptahijlmv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/mcmjzbsyvz", "-a", "sysv", "/tmp/jptahijlmv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/eazocsyyer"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/eazocsyyer"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/eazocsyyer"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/eazocsyyer"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/evxrvxquel"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/evxrvxquel"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/evxrvxquel"] Step #5: Rust stderr: Step #5: /tmp/evxrvxquel: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/evxrvxquel: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/evxrvxquel"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "--raw", "-l", "457", "-c", "/tmp/iurlowlmqo", "-a", "bsd", "/tmp/ubkmrssxiz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "--raw", "-l", "457", "-c", "/tmp/iurlowlmqo", "-a", "bsd", "/tmp/ubkmrssxiz"] Step #5: === Compare result for: cksum ["-a", "md5", "--raw", "-l", "457", "-c", "/tmp/iurlowlmqo", "-a", "bsd", "/tmp/ubkmrssxiz"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "--raw", "-l", "457", "-c", "/tmp/iurlowlmqo", "-a", "bsd", "/tmp/ubkmrssxiz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "--raw", "-c", "-a", "md5", "/tmp/ltfsumwfdk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "--raw", "-c", "-a", "md5", "/tmp/ltfsumwfdk"] Step #5: === Compare result for: cksum ["-a", "sm3", "--raw", "-c", "-a", "md5", "/tmp/ltfsumwfdk"] Step #5: Rust stderr: Step #5: /tmp/ltfsumwfdk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ltfsumwfdk: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "--raw", "-c", "-a", "md5", "/tmp/ltfsumwfdk"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "30", "-c", "-a", "sha224", "/tmp/idjqpawmyl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "30", "-c", "-a", "sha224", "/tmp/idjqpawmyl"] Step #5: === Compare result for: cksum ["-l", "30", "-c", "-a", "sha224", "/tmp/idjqpawmyl"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "30", "-c", "-a", "sha224", "/tmp/idjqpawmyl"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/xmedbpzzqu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/xmedbpzzqu"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/xmedbpzzqu"] Step #5: Rust stderr: Step #5: /tmp/xmedbpzzqu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xmedbpzzqu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/xmedbpzzqu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/cgpmohxcqt", "-a", "crc", "/tmp/aklehqxxsd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/cgpmohxcqt", "-a", "crc", "/tmp/aklehqxxsd"] Step #5: === Compare result for: cksum ["-c", "/tmp/cgpmohxcqt", "-a", "crc", "/tmp/aklehqxxsd"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/cgpmohxcqt", "-a", "crc", "/tmp/aklehqxxsd"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "blake2b", "/tmp/ohgmyjhuqt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "blake2b", "/tmp/ohgmyjhuqt"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "blake2b", "/tmp/ohgmyjhuqt"] Step #5: Rust stderr: Step #5: /tmp/ohgmyjhuqt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ohgmyjhuqt: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "blake2b", "/tmp/ohgmyjhuqt"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha224", "/tmp/nobmvgdouh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha224", "/tmp/nobmvgdouh"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha224", "/tmp/nobmvgdouh"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha224", "/tmp/nobmvgdouh"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/zjtevhmfrb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/zjtevhmfrb"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/zjtevhmfrb"] Step #5: Rust stderr: Step #5: /tmp/zjtevhmfrb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zjtevhmfrb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/zjtevhmfrb"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/blrtucigvb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/blrtucigvb"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/blrtucigvb"] Step #5: Rust stderr: Step #5: /tmp/blrtucigvb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/blrtucigvb: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/blrtucigvb"] Step #5: Step #5: === TEST cksum ["cksum", "file_(V(", "/tmp/bmbumgokja"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_(V(", "/tmp/bmbumgokja"] Step #5: === Compare result for: cksum ["file_(V(", "/tmp/bmbumgokja"] Step #5: Rust stderr: Step #5: file_(V(: No such file or directory Step #5: GNU stderr: Step #5: 'file_(V(': No such file or directory Step #5: --- START diff Step #5: -file_(V(: No such file or directory Step #5: +'file_(V(': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["file_(V(", "/tmp/bmbumgokja"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/lpmgsffpjx", "-a", "sha224", "/tmp/tkgamqnrsi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/lpmgsffpjx", "-a", "sha224", "/tmp/tkgamqnrsi"] Step #5: === Compare result for: cksum ["-c", "/tmp/lpmgsffpjx", "-a", "sha224", "/tmp/tkgamqnrsi"] Step #5: Rust stderr: Step #5: /tmp/lpmgsffpjx: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/tkgamqnrsi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lpmgsffpjx: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/tkgamqnrsi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/lpmgsffpjx", "-a", "sha224", "/tmp/tkgamqnrsi"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "248", "-c", "-a", "sha384", "/tmp/nplixnuipj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "248", "-c", "-a", "sha384", "/tmp/nplixnuipj"] Step #5: === Compare result for: cksum ["-l", "248", "-c", "-a", "sha384", "/tmp/nplixnuipj"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "248", "-c", "-a", "sha384", "/tmp/nplixnuipj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/imwbzydbwv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/imwbzydbwv"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/imwbzydbwv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/imwbzydbwv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yegbikvxwc", "-a", "sha224", "/tmp/jgfamtflfc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yegbikvxwc", "-a", "sha224", "/tmp/jgfamtflfc"] Step #5: === Compare result for: cksum ["-c", "/tmp/yegbikvxwc", "-a", "sha224", "/tmp/jgfamtflfc"] Step #5: Rust stderr: Step #5: /tmp/yegbikvxwc: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/jgfamtflfc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yegbikvxwc: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/jgfamtflfc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yegbikvxwc", "-a", "sha224", "/tmp/jgfamtflfc"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/extnsfjoyv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/extnsfjoyv"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/extnsfjoyv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/extnsfjoyv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "--binary", "-l", "105", "-c", "-a", "sm3", "/tmp/rcrlzodmwz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "--binary", "-l", "105", "-c", "-a", "sm3", "/tmp/rcrlzodmwz"] Step #5: === Compare result for: cksum ["-a", "bsd", "--binary", "-l", "105", "-c", "-a", "sm3", "/tmp/rcrlzodmwz"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "--binary", "-l", "105", "-c", "-a", "sm3", "/tmp/rcrlzodmwz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "sysv", "/tmp/ythxyvnlxo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "sysv", "/tmp/ythxyvnlxo"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "sysv", "/tmp/ythxyvnlxo"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "sysv", "/tmp/ythxyvnlxo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/fuayunbffm", "-a", "sm3", "/tmp/ynialvhdne"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/fuayunbffm", "-a", "sm3", "/tmp/ynialvhdne"] Step #5: === Compare result for: cksum ["-c", "/tmp/fuayunbffm", "-a", "sm3", "/tmp/ynialvhdne"] Step #5: Rust stderr: Step #5: /tmp/fuayunbffm: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ynialvhdne: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fuayunbffm: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/ynialvhdne: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/fuayunbffm", "-a", "sm3", "/tmp/ynialvhdne"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-l", "78", "-c", "/tmp/kebhzygdxo", "-a", "sha1", "/tmp/ozvjlhozhm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-l", "78", "-c", "/tmp/kebhzygdxo", "-a", "sha1", "/tmp/ozvjlhozhm"] Step #5: === Compare result for: cksum ["-a", "sha1", "-l", "78", "-c", "/tmp/kebhzygdxo", "-a", "sha1", "/tmp/ozvjlhozhm"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-l", "78", "-c", "/tmp/kebhzygdxo", "-a", "sha1", "/tmp/ozvjlhozhm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yrnfesyayk", "-a", "sysv", "/tmp/fldpbvpdiz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yrnfesyayk", "-a", "sysv", "/tmp/fldpbvpdiz"] Step #5: === Compare result for: cksum ["-c", "/tmp/yrnfesyayk", "-a", "sysv", "/tmp/fldpbvpdiz"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yrnfesyayk", "-a", "sysv", "/tmp/fldpbvpdiz"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "466", "-c", "-a", "sha224", "/tmp/sofeogdmmd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "466", "-c", "-a", "sha224", "/tmp/sofeogdmmd"] Step #5: === Compare result for: cksum ["-l", "466", "-c", "-a", "sha224", "/tmp/sofeogdmmd"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "466", "-c", "-a", "sha224", "/tmp/sofeogdmmd"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "--base64", "-c", "-a", "sysv", "/tmp/vttmrliixj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "--base64", "-c", "-a", "sysv", "/tmp/vttmrliixj"] Step #5: === Compare result for: cksum ["-a", "sha1", "--base64", "-c", "-a", "sysv", "/tmp/vttmrliixj"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "--base64", "-c", "-a", "sysv", "/tmp/vttmrliixj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-a", "sha1", "/tmp/cwfvgfzcip"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-a", "sha1", "/tmp/cwfvgfzcip"] Step #5: === Compare result for: cksum ["-a", "sysv", "-a", "sha1", "/tmp/cwfvgfzcip"] Step #5: Rust stdout: Step #5: SHA1 (/tmp/cwfvgfzcip) = 7d44000b66b2dee4fc13cd1f69d200e37a9f7442 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA1 (/tmp/cwfvgfzcip) = 7d44000b66b2dee4fc13cd1f69d200e37a9f7442 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sysv", "-a", "sha1", "/tmp/cwfvgfzcip"] Step #5: Step #5: thread '' (8292) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sysv", "-a", "sha1", "/tmp/cwfvgfzcip"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8292== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x4f,0x3a,0x31,0x32,0x3a,0x22,0x44,0x61,0x74,0x65,0x49,0x6e,0x74,0x65,0x72,0x76,0x61,0x6c,0x22,0x3a,0x31,0x3a,0x7b,0x73,0x3a,0x31,0x31,0x3a,0x22,0x64,0x61,0x74,0x65,0x5f,0x73,0x74,0x72,0x69,0x6e,0x67,0x22,0x3b,0x73,0x3a,0x34,0x33,0x3a,0x22,0x49,0x32,0x32,0x72,0x30,0x2e,0x31,0x2e,0x30,0x30,0x22,0x5d,0x73,0x3a,0x34,0x33,0x3a,0x22,0x49,0x32,0x32,0x72,0x30,0x2e,0x31,0x2e,0x30,0x30,0x22,0x5d,0x6e,0x34,0x61,0x20,0x7a,0x52,0x64,0x3a,0x34,0x33,0x30,0x26,0x30,0x22,0x3b, Step #5: O:12:\"DateInterval\":1:{s:11:\"date_string\";s:43:\"I22r0.1.00\"]s:43:\"I22r0.1.00\"]n4a zRd:430&0\"; Step #5: artifact_prefix='./'; Test unit written to ./crash-7709ef157d40deab579cbd088af3bf40a7a0fe61 Step #5: Base64: TzoxMjoiRGF0ZUludGVydmFsIjoxOntzOjExOiJkYXRlX3N0cmluZyI7czo0MzoiSTIycjAuMS4wMCJdczo0MzoiSTIycjAuMS4wMCJdbjRhIHpSZDo0MzAmMCI7 Step #5: MERGE-OUTER: attempt 9 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033268367 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/7709ef157d40deab579cbd088af3bf40a7a0fe61' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 355 processed earlier; will process 70 files now Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sha512", "/tmp/xrwfaifcac"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sha512", "/tmp/xrwfaifcac"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sha512", "/tmp/xrwfaifcac"] Step #5: Rust stderr: Step #5: /tmp/xrwfaifcac: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xrwfaifcac: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sha512", "/tmp/xrwfaifcac"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "sha384", "/tmp/ttkgbkcvak"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "sha384", "/tmp/ttkgbkcvak"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "sha384", "/tmp/ttkgbkcvak"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "sha384", "/tmp/ttkgbkcvak"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/fhkfuiralg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/fhkfuiralg"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/fhkfuiralg"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/fhkfuiralg"] Step #5: Step #5: === TEST cksum ["cksum", "file_xF"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_xF"] Step #5: === Compare result for: cksum ["file_xF"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "509", "-c", "/tmp/fwyeuyolef", "-a", "sha512", "/tmp/ewmmxiojqy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "509", "-c", "/tmp/fwyeuyolef", "-a", "sha512", "/tmp/ewmmxiojqy"] Step #5: === Compare result for: cksum ["-l", "509", "-c", "/tmp/fwyeuyolef", "-a", "sha512", "/tmp/ewmmxiojqy"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "509", "-c", "/tmp/fwyeuyolef", "-a", "sha512", "/tmp/ewmmxiojqy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/jrudlnaqwq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/jrudlnaqwq"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/jrudlnaqwq"] Step #5: Rust stderr: Step #5: /tmp/jrudlnaqwq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jrudlnaqwq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/jrudlnaqwq"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "17", "-c", "-a", "sha512", "/tmp/bnuguwmrlj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "17", "-c", "-a", "sha512", "/tmp/bnuguwmrlj"] Step #5: === Compare result for: cksum ["-l", "17", "-c", "-a", "sha512", "/tmp/bnuguwmrlj"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "17", "-c", "-a", "sha512", "/tmp/bnuguwmrlj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "bsd", "/tmp/znvrkfjpwz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "bsd", "/tmp/znvrkfjpwz"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "bsd", "/tmp/znvrkfjpwz"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "bsd", "/tmp/znvrkfjpwz"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/ndsldqszpw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/ndsldqszpw"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/ndsldqszpw"] Step #5: Rust stderr: Step #5: /tmp/ndsldqszpw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ndsldqszpw: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/ndsldqszpw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/ydloabpaeh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/ydloabpaeh"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/ydloabpaeh"] Step #5: Rust stderr: Step #5: /tmp/ydloabpaeh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ydloabpaeh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/ydloabpaeh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/navlmghouz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/navlmghouz"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/navlmghouz"] Step #5: Rust stderr: Step #5: /tmp/navlmghouz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/navlmghouz: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/navlmghouz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/qktnrsxcns"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/qktnrsxcns"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/qktnrsxcns"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/qktnrsxcns"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/dvyeootxny"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/dvyeootxny"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/dvyeootxny"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/dvyeootxny"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/xgotmbsvgb", "-a", "sha384", "/tmp/qhxydcklax"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/xgotmbsvgb", "-a", "sha384", "/tmp/qhxydcklax"] Step #5: === Compare result for: cksum ["-c", "/tmp/xgotmbsvgb", "-a", "sha384", "/tmp/qhxydcklax"] Step #5: Rust stderr: Step #5: /tmp/xgotmbsvgb: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/qhxydcklax: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xgotmbsvgb: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/qhxydcklax: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/xgotmbsvgb", "-a", "sha384", "/tmp/qhxydcklax"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/mthqdalkjl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sysv", "/tmp/mthqdalkjl"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/mthqdalkjl"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sysv", "/tmp/mthqdalkjl"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/dukcktabqg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/dukcktabqg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/dukcktabqg"] Step #5: Rust stderr: Step #5: /tmp/dukcktabqg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dukcktabqg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/dukcktabqg"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/gbizswbppb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/gbizswbppb"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/gbizswbppb"] Step #5: Rust stderr: Step #5: /tmp/gbizswbppb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gbizswbppb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/gbizswbppb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/yljcuuyjcu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/yljcuuyjcu"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/yljcuuyjcu"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/yljcuuyjcu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/jxkksgoebs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/jxkksgoebs"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/jxkksgoebs"] Step #5: Rust stderr: Step #5: /tmp/jxkksgoebs: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jxkksgoebs: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/jxkksgoebs"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "--untagged", "-c", "-a", "sha384", "/tmp/mfadzxsluj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "--untagged", "-c", "-a", "sha384", "/tmp/mfadzxsluj"] Step #5: === Compare result for: cksum ["-a", "bsd", "--untagged", "-c", "-a", "sha384", "/tmp/mfadzxsluj"] Step #5: Rust stderr: Step #5: /tmp/mfadzxsluj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mfadzxsluj: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "--untagged", "-c", "-a", "sha384", "/tmp/mfadzxsluj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "md5", "/tmp/vwywpsdkuf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "md5", "/tmp/vwywpsdkuf"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "md5", "/tmp/vwywpsdkuf"] Step #5: Rust stderr: Step #5: /tmp/vwywpsdkuf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vwywpsdkuf: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "md5", "/tmp/vwywpsdkuf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "/tmp/sagljbftoy", "-a", "bsd", "/tmp/iwpkyiqunn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "/tmp/sagljbftoy", "-a", "bsd", "/tmp/iwpkyiqunn"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "/tmp/sagljbftoy", "-a", "bsd", "/tmp/iwpkyiqunn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "/tmp/sagljbftoy", "-a", "bsd", "/tmp/iwpkyiqunn"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-l", "143", "-c", "/tmp/qbvsqvgjcw", "-a", "md5", "/tmp/tcgzwalkee"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-l", "143", "-c", "/tmp/qbvsqvgjcw", "-a", "md5", "/tmp/tcgzwalkee"] Step #5: === Compare result for: cksum ["--untagged", "-l", "143", "-c", "/tmp/qbvsqvgjcw", "-a", "md5", "/tmp/tcgzwalkee"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-l", "143", "-c", "/tmp/qbvsqvgjcw", "-a", "md5", "/tmp/tcgzwalkee"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/uowwuvqaxc", "-a", "sysv", "/tmp/ubzsulhalk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/uowwuvqaxc", "-a", "sysv", "/tmp/ubzsulhalk"] Step #5: === Compare result for: cksum ["-c", "/tmp/uowwuvqaxc", "-a", "sysv", "/tmp/ubzsulhalk"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/uowwuvqaxc", "-a", "sysv", "/tmp/ubzsulhalk"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-l", "19", "-c", "-a", "md5", "/tmp/kofivbbfav"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-l", "19", "-c", "-a", "md5", "/tmp/kofivbbfav"] Step #5: === Compare result for: cksum ["-a", "sha224", "-l", "19", "-c", "-a", "md5", "/tmp/kofivbbfav"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-l", "19", "-c", "-a", "md5", "/tmp/kofivbbfav"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/ertqxksewp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/ertqxksewp"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/ertqxksewp"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/ertqxksewp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/olpeucdnal", "-a", "md5", "/tmp/nmezdisbeq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/olpeucdnal", "-a", "md5", "/tmp/nmezdisbeq"] Step #5: === Compare result for: cksum ["-c", "/tmp/olpeucdnal", "-a", "md5", "/tmp/nmezdisbeq"] Step #5: Rust stderr: Step #5: /tmp/olpeucdnal: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/nmezdisbeq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/olpeucdnal: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/nmezdisbeq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/olpeucdnal", "-a", "md5", "/tmp/nmezdisbeq"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha384", "/tmp/coqrskkzpw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha384", "/tmp/coqrskkzpw"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha384", "/tmp/coqrskkzpw"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha384", "/tmp/coqrskkzpw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/bsbdhqiggc", "-a", "sha1", "/tmp/wxtzwvhbhd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/bsbdhqiggc", "-a", "sha1", "/tmp/wxtzwvhbhd"] Step #5: MERGE-OUTER: attempt 10 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033393931 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/577d733c32c2f0beaa4e3652a7ae63f068aed6a8' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 384 processed earlier; will process 41 files now Step #5: === TEST cksum ["cksum", "-c", "/tmp/sdicydvtyy", "-a", "sha1", "/tmp/wamhyzkkvt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/sdicydvtyy", "-a", "sha1", "/tmp/wamhyzkkvt"] Step #5: === Compare result for: cksum ["-c", "/tmp/sdicydvtyy", "-a", "sha1", "/tmp/wamhyzkkvt"] Step #5: Rust stderr: Step #5: /tmp/sdicydvtyy: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/wamhyzkkvt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sdicydvtyy: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/wamhyzkkvt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/sdicydvtyy", "-a", "sha1", "/tmp/wamhyzkkvt"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha224", "file_bgv", "file_cCA"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "file_bgv", "file_cCA"] Step #5: === Compare result for: cksum ["-a", "sha224", "file_bgv", "file_cCA"] Step #5: Rust stderr: Step #5: file_bgv: No such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: file_cCA: No such file or directory Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_bgv: No such file or directory Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: file_cCA: No such file or directory Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "file_bgv", "file_cCA"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/oettiwgkfy", "-a", "md5", "/tmp/geeacfuqvl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/oettiwgkfy", "-a", "md5", "/tmp/geeacfuqvl"] Step #5: === Compare result for: cksum ["-c", "/tmp/oettiwgkfy", "-a", "md5", "/tmp/geeacfuqvl"] Step #5: Rust stderr: Step #5: /tmp/oettiwgkfy: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/geeacfuqvl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/oettiwgkfy: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/geeacfuqvl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/oettiwgkfy", "-a", "md5", "/tmp/geeacfuqvl"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "34", "-c", "-a", "md5", "/tmp/lskpkgmajp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "34", "-c", "-a", "md5", "/tmp/lskpkgmajp"] Step #5: === Compare result for: cksum ["-l", "34", "-c", "-a", "md5", "/tmp/lskpkgmajp"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "34", "-c", "-a", "md5", "/tmp/lskpkgmajp"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "494", "-c", "-a", "sha224", "/tmp/ugegcrkenf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "494", "-c", "-a", "sha224", "/tmp/ugegcrkenf"] Step #5: === Compare result for: cksum ["-l", "494", "-c", "-a", "sha224", "/tmp/ugegcrkenf"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "494", "-c", "-a", "sha224", "/tmp/ugegcrkenf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/vybovbvhmy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/vybovbvhmy"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/vybovbvhmy"] Step #5: Rust stderr: Step #5: /tmp/vybovbvhmy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vybovbvhmy: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/vybovbvhmy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/cvaihbusmn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/cvaihbusmn"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/cvaihbusmn"] Step #5: Rust stderr: Step #5: /tmp/cvaihbusmn: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cvaihbusmn: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/cvaihbusmn"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/llefdoleop"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/llefdoleop"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/llefdoleop"] Step #5: Rust stderr: Step #5: /tmp/llefdoleop: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/llefdoleop: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/llefdoleop"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/wbiednqhut"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/wbiednqhut"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/wbiednqhut"] Step #5: Rust stderr: Step #5: /tmp/wbiednqhut: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wbiednqhut: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/wbiednqhut"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/eaivnarydo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/eaivnarydo"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/eaivnarydo"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/eaivnarydo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yaapwkyngb", "-a", "sm3", "/tmp/rxlqjuxovr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yaapwkyngb", "-a", "sm3", "/tmp/rxlqjuxovr"] Step #5: === Compare result for: cksum ["-c", "/tmp/yaapwkyngb", "-a", "sm3", "/tmp/rxlqjuxovr"] Step #5: Rust stderr: Step #5: /tmp/yaapwkyngb: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/rxlqjuxovr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yaapwkyngb: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/rxlqjuxovr: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yaapwkyngb", "-a", "sm3", "/tmp/rxlqjuxovr"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "69", "-c", "-a", "md5", "/tmp/amhyfdcqwv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "69", "-c", "-a", "md5", "/tmp/amhyfdcqwv"] Step #5: === Compare result for: cksum ["-l", "69", "-c", "-a", "md5", "/tmp/amhyfdcqwv"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "69", "-c", "-a", "md5", "/tmp/amhyfdcqwv"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "441", "-c", "-a", "blake2b", "/tmp/gygmuztjwo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "441", "-c", "-a", "blake2b", "/tmp/gygmuztjwo"] Step #5: === Compare result for: cksum ["-l", "441", "-c", "-a", "blake2b", "/tmp/gygmuztjwo"] Step #5: Rust stderr: Step #5: invalid length: ‘441’ Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: length is not a multiple of 8 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -invalid length: ‘441’ Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: length is not a multiple of 8 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "441", "-c", "-a", "blake2b", "/tmp/gygmuztjwo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/hugvdohvip"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/hugvdohvip"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/hugvdohvip"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/hugvdohvip"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "--tag", "-c", "/tmp/titqyeoshp", "-a", "bsd", "/tmp/jgewsddjvw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "--tag", "-c", "/tmp/titqyeoshp", "-a", "bsd", "/tmp/jgewsddjvw"] Step #5: === Compare result for: cksum ["-a", "sysv", "--tag", "-c", "/tmp/titqyeoshp", "-a", "bsd", "/tmp/jgewsddjvw"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "--tag", "-c", "/tmp/titqyeoshp", "-a", "bsd", "/tmp/jgewsddjvw"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "407", "-c", "-a", "md5", "/tmp/ippcrjwpdx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "407", "-c", "-a", "md5", "/tmp/ippcrjwpdx"] Step #5: === Compare result for: cksum ["-l", "407", "-c", "-a", "md5", "/tmp/ippcrjwpdx"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "407", "-c", "-a", "md5", "/tmp/ippcrjwpdx"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/hbkywhpvxl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/hbkywhpvxl"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/hbkywhpvxl"] Step #5: Rust stderr: Step #5: /tmp/hbkywhpvxl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hbkywhpvxl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/hbkywhpvxl"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "sha224", "/tmp/xvzkigwrjt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "sha224", "/tmp/xvzkigwrjt"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "sha224", "/tmp/xvzkigwrjt"] Step #5: Rust stderr: Step #5: /tmp/xvzkigwrjt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xvzkigwrjt: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "sha224", "/tmp/xvzkigwrjt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/vrpvzzmerg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/vrpvzzmerg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/vrpvzzmerg"] Step #5: Rust stderr: Step #5: /tmp/vrpvzzmerg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vrpvzzmerg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/vrpvzzmerg"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/fijwzzysru"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/fijwzzysru"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/fijwzzysru"] Step #5: Rust stderr: Step #5: /tmp/fijwzzysru: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fijwzzysru: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/fijwzzysru"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "/tmp/xlxvxnahzo", "-a", "sha384", "/tmp/kigvqyykmt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "/tmp/xlxvxnahzo", "-a", "sha384", "/tmp/kigvqyykmt"] Step #5: === Compare result for: cksum ["--text", "-c", "/tmp/xlxvxnahzo", "-a", "sha384", "/tmp/kigvqyykmt"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "/tmp/xlxvxnahzo", "-a", "sha384", "/tmp/kigvqyykmt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/wjrciqxhin"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/wjrciqxhin"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/wjrciqxhin"] Step #5: Rust stderr: Step #5: /tmp/wjrciqxhin: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wjrciqxhin: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/wjrciqxhin"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/wurcmmkzgg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/wurcmmkzgg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/wurcmmkzgg"] Step #5: Rust stderr: Step #5: /tmp/wurcmmkzgg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wurcmmkzgg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/wurcmmkzgg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/jaosftwhzm", "-a", "blake2b", "/tmp/qzwkgyswkx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/jaosftwhzm", "-a", "blake2b", "/tmp/qzwkgyswkx"] Step #5: === Compare result for: cksum ["-c", "/tmp/jaosftwhzm", "-a", "blake2b", "/tmp/qzwkgyswkx"] Step #5: Rust stderr: Step #5: /tmp/jaosftwhzm: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/qzwkgyswkx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jaosftwhzm: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/qzwkgyswkx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/jaosftwhzm", "-a", "blake2b", "/tmp/qzwkgyswkx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/uluidynuop", "-a", "md5", "/tmp/kflepzihig"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/uluidynuop", "-a", "md5", "/tmp/kflepzihig"] Step #5: === Compare result for: cksum ["-c", "/tmp/uluidynuop", "-a", "md5", "/tmp/kflepzihig"] Step #5: Rust stderr: Step #5: /tmp/uluidynuop: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/kflepzihig: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uluidynuop: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/kflepzihig: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/uluidynuop", "-a", "md5", "/tmp/kflepzihig"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/xmkakeoree", "-a", "sha512", "/tmp/blimhxshmt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/xmkakeoree", "-a", "sha512", "/tmp/blimhxshmt"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/xmkakeoree", "-a", "sha512", "/tmp/blimhxshmt"] Step #5: Rust stderr: Step #5: /tmp/xmkakeoree: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/blimhxshmt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xmkakeoree: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/blimhxshmt: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/xmkakeoree", "-a", "sha512", "/tmp/blimhxshmt"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "22", "-c", "-a", "sha256", "/tmp/jxjndpwwcy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "22", "-c", "-a", "sha256", "/tmp/jxjndpwwcy"] Step #5: === Compare result for: cksum ["-l", "22", "-c", "-a", "sha256", "/tmp/jxjndpwwcy"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "22", "-c", "-a", "sha256", "/tmp/jxjndpwwcy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/ehwcvcbcbh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/ehwcvcbcbh"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/ehwcvcbcbh"] Step #5: Rust stderr: Step #5: /tmp/ehwcvcbcbh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ehwcvcbcbh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/ehwcvcbcbh"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sm3", "/tmp/vwhopqtwhf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sm3", "/tmp/vwhopqtwhf"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sm3", "/tmp/vwhopqtwhf"] Step #5: Rust stderr: Step #5: /tmp/vwhopqtwhf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vwhopqtwhf: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sm3", "/tmp/vwhopqtwhf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "/tmp/sxckbgvzhg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "/tmp/sxckbgvzhg"] Step #5: === Compare result for: cksum ["-a", "blake2b", "/tmp/sxckbgvzhg"] Step #5: Rust stdout: Step #5: BLAKE2b (/tmp/sxckbgvzhg) = e3a0195363d6ba776532d1d0f97040bec3c1c6c8e9935134e0bef82114f8731fe49a8b3522eca925b5492962d3d7e985be9caa741bc912bdc4abbd82f431e1c1 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -BLAKE2b (/tmp/sxckbgvzhg) = e3a0195363d6ba776532d1d0f97040bec3c1c6c8e9935134e0bef82114f8731fe49a8b3522eca925b5492962d3d7e985be9caa741bc912bdc4abbd82f431e1c1 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "blake2b", "/tmp/sxckbgvzhg"] Step #5: Step #5: thread '' (8904) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "blake2b", "/tmp/sxckbgvzhg"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8904== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-174ae931ea159090287a84accf185743ad48ead7 Step #5: MERGE-OUTER: attempt 11 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033529642 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/174ae931ea159090287a84accf185743ad48ead7' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 414 processed earlier; will process 11 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/wyxrcjmtqi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/wyxrcjmtqi"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/wyxrcjmtqi"] Step #5: Rust stderr: Step #5: /tmp/wyxrcjmtqi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wyxrcjmtqi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/wyxrcjmtqi"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "394", "-c", "-a", "md5", "/tmp/synlakwqsv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "394", "-c", "-a", "md5", "/tmp/synlakwqsv"] Step #5: === Compare result for: cksum ["-l", "394", "-c", "-a", "md5", "/tmp/synlakwqsv"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm=blake2b Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm=blake2b Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "394", "-c", "-a", "md5", "/tmp/synlakwqsv"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sm3", "/tmp/hueijhlttd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sm3", "/tmp/hueijhlttd"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sm3", "/tmp/hueijhlttd"] Step #5: Rust stderr: Step #5: /tmp/hueijhlttd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hueijhlttd: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sm3", "/tmp/hueijhlttd"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sha256", "/tmp/gnwajyfnwm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sha256", "/tmp/gnwajyfnwm"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sha256", "/tmp/gnwajyfnwm"] Step #5: Rust stderr: Step #5: /tmp/gnwajyfnwm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gnwajyfnwm: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sha256", "/tmp/gnwajyfnwm"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sha512", "/tmp/ofqvfokmyp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sha512", "/tmp/ofqvfokmyp"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sha512", "/tmp/ofqvfokmyp"] Step #5: Rust stderr: Step #5: /tmp/ofqvfokmyp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ofqvfokmyp: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sha512", "/tmp/ofqvfokmyp"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "crc", "/tmp/ttnmxmdriv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "crc", "/tmp/ttnmxmdriv"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "crc", "/tmp/ttnmxmdriv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "crc", "/tmp/ttnmxmdriv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/lhgxonhvty"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/lhgxonhvty"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/lhgxonhvty"] Step #5: Rust stderr: Step #5: /tmp/lhgxonhvty: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lhgxonhvty: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/lhgxonhvty"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "--untagged", "-c", "/tmp/rvpnyiyzqq", "-a", "sha512", "/tmp/eiibbseomt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "--untagged", "-c", "/tmp/rvpnyiyzqq", "-a", "sha512", "/tmp/eiibbseomt"] Step #5: === Compare result for: cksum ["-a", "sha224", "--untagged", "-c", "/tmp/rvpnyiyzqq", "-a", "sha512", "/tmp/eiibbseomt"] Step #5: Rust stderr: Step #5: /tmp/rvpnyiyzqq: no properly formatted checksum lines found Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/eiibbseomt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rvpnyiyzqq: no properly formatted checksum lines found Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum: /tmp/eiibbseomt: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "--untagged", "-c", "/tmp/rvpnyiyzqq", "-a", "sha512", "/tmp/eiibbseomt"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "md5", "/tmp/hbpcxehrvz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "md5", "/tmp/hbpcxehrvz"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "md5", "/tmp/hbpcxehrvz"] Step #5: Rust stderr: Step #5: /tmp/hbpcxehrvz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hbpcxehrvz: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "md5", "/tmp/hbpcxehrvz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "--base64", "-a", "sha384", "/tmp/eznrhhgoay"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "--base64", "-a", "sha384", "/tmp/eznrhhgoay"] Step #5: === Compare result for: cksum ["-a", "sha384", "--base64", "-a", "sha384", "/tmp/eznrhhgoay"] Step #5: Rust stdout: Step #5: SHA384 (/tmp/eznrhhgoay) = r2HcLOadIgE3UlmnKSUS6MCVQnrO1bb0PfPttF5O1C7kqTCObfhfh+eOk0cHpAOB Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA384 (/tmp/eznrhhgoay) = r2HcLOadIgE3UlmnKSUS6MCVQnrO1bb0PfPttF5O1C7kqTCObfhfh+eOk0cHpAOB Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sha384", "--base64", "-a", "sha384", "/tmp/eznrhhgoay"] Step #5: Step #5: thread '' (9121) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sha384", "--base64", "-a", "sha384", "/tmp/eznrhhgoay"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9121== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-9c1becb01109737649b073e50019fde4107ef55e Step #5: MERGE-OUTER: attempt 12 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033586157 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge393.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/9c1becb01109737649b073e50019fde4107ef55e' caused a failure at the previous merge step Step #5: MERGE-INNER: 425 total files; 424 processed earlier; will process 1 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/fmbodnlisr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/fmbodnlisr"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/fmbodnlisr"] Step #5: Rust stderr: Step #5: /tmp/fmbodnlisr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fmbodnlisr: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/fmbodnlisr"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #1 DONE exec/s: 0 rss: 29Mb Step #5: MERGE-OUTER: successful in 12 attempt(s) Step #5: MERGE-OUTER: the control file has 37568 bytes Step #5: MERGE-OUTER: consumed 0Mb (27Mb rss) to parse the control file Step #5: MERGE-OUTER: 0 new files with 0 new features added; 0 new coverage edges Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_seq_error.log Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_split_error.log Step #5: [2025-10-03 06:09:06,352 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:06,362 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_cksum_error.log Step #5: Error occured while running fuzz_env: Step #5: Cov returncode: 0, grep returncode: 0 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031828075 Step #5: MERGE-OUTER: 257 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031842251 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: 257 total files; 0 processed earlier; will process 257 files now Step #5: Running test ["env", "-v", "e="] Step #5: === Compare result for: env ["-v", "e="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: e= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: e= Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: e= Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: e= Step #5: --- START diff Step #5: +e= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "e="] Step #5: Step #5: thread '' (1281) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "e="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1281== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x66, Step #5: f Step #5: artifact_prefix='./'; Test unit written to ./crash-4a0a19218e082a343a1b17e5333409af9d98f0f5 Step #5: Base64: Zg== Step #5: MERGE-OUTER: attempt 2 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031860469 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/4a0a19218e082a343a1b17e5333409af9d98f0f5' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 1 processed earlier; will process 256 files now Step #5: Running test ["env", "-v", "RJs🧰=", "j=RkdZE"] Step #5: === Compare result for: env ["-v", "RJs🧰=", "j=RkdZE"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: RJs🧰= Step #5: j=RkdZE Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: RJs🧰= Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: j=RkdZE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: +RJs🧰= Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -RJs🧰= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: j=RkdZE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: RJs🧰= Step #5: setenv: j=RkdZE Step #5: --- START diff Step #5: +RJs🧰= Step #5: +setenv: j=RkdZE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "RJs🧰=", "j=RkdZE"] Step #5: Step #5: thread '' (1405) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "RJs🧰=", "j=RkdZE"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1405== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6a, Step #5: j Step #5: artifact_prefix='./'; Test unit written to ./crash-5c2dd944dde9e08881bef0894fe7b22a5c9c4b06 Step #5: Base64: ag== Step #5: MERGE-OUTER: attempt 3 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031877503 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5c2dd944dde9e08881bef0894fe7b22a5c9c4b06' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 2 processed earlier; will process 255 files now Step #5: Running test ["env", "-vv", "-u=L🪓\u{fe0f}QI", "aS=\u{fe0f}7A9", "Ã=q🔩"] Step #5: === Compare result for: env ["-vv", "-u=L🪓\u{fe0f}QI", "aS=\u{fe0f}7A9", "Ã=q🔩"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =L🪓️QI Step #5: env: cannot unset '=L\360\237\252\223\357\270\217QI': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=L🪓️QI Step #5: +env: cannot unset '=L\360\237\252\223\357\270\217QI': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=L🪓\u{fe0f}QI", "aS=\u{fe0f}7A9", "Ã=q🔩"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-u=MSHknJ", "RÃc=wx"] Step #5: === Compare result for: env ["-0", "-u=MSHknJ", "RÃc=wx"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=MSHknJ': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=MSHknJ': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=MSHknJ", "RÃc=wx"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp", "⚙y🪛=ÃmK8", "Rg1E\u{fe0f}=(Z"] Step #5: === Compare result for: env ["--chdir=/tmp", "⚙y🪛=ÃmK8", "Rg1E\u{fe0f}=(Z"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "⚙y🪛=ÃmK8", "Rg1E\u{fe0f}=(Z"] Step #5: Step #5: Running test ["env", "-0", "-v", "46X="] Step #5: === Compare result for: env ["-0", "-v", "46X="] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work46X= Step #5: GNU stdout: Step #5: 46X=AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work46X= Step #5: +46X=AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 46X= Step #5: --- START diff Step #5: +46X= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "46X="] Step #5: Step #5: thread '' (1513) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "46X="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1513== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x48, Step #5: H Step #5: artifact_prefix='./'; Test unit written to ./crash-7cf184f4c67ad58283ecb19349720b0cae756829 Step #5: Base64: SA== Step #5: MERGE-OUTER: attempt 4 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031898995 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7cf184f4c67ad58283ecb19349720b0cae756829' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 6 processed earlier; will process 251 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (1634) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1634== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x34, Step #5: 4 Step #5: artifact_prefix='./'; Test unit written to ./crash-1b6453892473a467d07372d45eb05abc2031647a Step #5: Base64: NA== Step #5: MERGE-OUTER: attempt 5 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031918363 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1b6453892473a467d07372d45eb05abc2031647a' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 8 processed earlier; will process 249 files now Step #5: Running test ["env", "-i", "-0", "-v", "--chdir=/tmp"] Step #5: === Compare result for: env ["-i", "-0", "-v", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "-v", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "GÃk=z", "zJu=🔩O("] Step #5: === Compare result for: env ["GÃk=z", "zJu=🔩O("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: GÃk=z Step #5: zJu=🔩O( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: GÃk=z Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: zJu=🔩O( Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +GÃk=z Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -GÃk=z Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: zJu=🔩O( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["GÃk=z", "zJu=🔩O("] Step #5: Step #5: thread '' (1752) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["GÃk=z", "zJu=🔩O("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1752== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x32, Step #5: 2 Step #5: artifact_prefix='./'; Test unit written to ./crash-da4b9237bacccdf19c0760cab7aec4a8359010b0 Step #5: Base64: Mg== Step #5: MERGE-OUTER: attempt 6 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031939612 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/da4b9237bacccdf19c0760cab7aec4a8359010b0' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 10 processed earlier; will process 247 files now Step #5: Running test ["env", "-0", "--chdir=/tmp", "\u{fe0f}🪓yK=f🪛"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "\u{fe0f}🪓yK=f🪛"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "\u{fe0f}🪓yK=f🪛"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-v", "🪛J47=Ã8🪛u"] Step #5: === Compare result for: env ["-i", "-v", "🪛J47=Ã8🪛u"] Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 🪛J47=Ã8🪛u Step #5: --- START diff Step #5: +🪛J47=Ã8🪛u Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "🪛J47=Ã8🪛u"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "--chdir=/tmp", "X(gd="] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "X(gd="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: X(gd= Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +X(gd= Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "X(gd="] Step #5: Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-u=🔩R🔩48", "ANq=", "SfKti=Kcg"] Step #5: === Compare result for: env ["-i", "-u=🔩R🔩48", "ANq=", "SfKti=Kcg"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: ANq= Step #5: SfKti=Kcg Step #5: Step #5: --- START diff Step #5: +ANq= Step #5: +SfKti=Kcg Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=🔩R🔩48", "ANq=", "SfKti=Kcg"] Step #5: Step #5: thread '' (1861) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=🔩R🔩48", "ANq=", "SfKti=Kcg"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1861== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x60, Step #5: ` Step #5: artifact_prefix='./'; Test unit written to ./crash-7e15bb5c01e7dd56499e37c634cf791d3a519aee Step #5: Base64: YA== Step #5: MERGE-OUTER: attempt 7 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031963992 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7e15bb5c01e7dd56499e37c634cf791d3a519aee' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 15 processed earlier; will process 242 files now Step #5: Running test ["env", "Z🔩BtÃ=("] Step #5: === Compare result for: env ["Z🔩BtÃ=("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Z🔩BtÃ=( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: Z🔩BtÃ=( Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: Z🔩BtÃ=( Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["Z🔩BtÃ=("] Step #5: Step #5: thread '' (2005) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Z🔩BtÃ=("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2005== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x20, Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-b858cb282617fb0956d960215c8e84d1ccf909c6 Step #5: Base64: IA== Step #5: MERGE-OUTER: attempt 8 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031980693 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b858cb282617fb0956d960215c8e84d1ccf909c6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 16 processed earlier; will process 241 files now Step #5: Running test ["env", "-i", "-u=WO5hDvvP"] Step #5: === Compare result for: env ["-i", "-u=WO5hDvvP"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=WO5hDvvP"] Step #5: Step #5: thread '' (2092) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=WO5hDvvP"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2092== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e, Step #5: . Step #5: artifact_prefix='./'; Test unit written to ./crash-3a52ce780950d4d969792a2559cd519d7ee8c727 Step #5: Base64: Lg== Step #5: MERGE-OUTER: attempt 9 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4031996620 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3a52ce780950d4d969792a2559cd519d7ee8c727' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 17 processed earlier; will process 240 files now Step #5: Running test ["env", "-i", "-v", "-vv", "y9🔩=GwyA"] Step #5: === Compare result for: env ["-i", "-v", "-vv", "y9🔩=GwyA"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-v' Step #5: arg[3]: '-vv' Step #5: arg[4]: 'y9🔩=GwyA' Step #5: GNU stderr: Step #5: y9🔩=GwyA Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-v' Step #5: -arg[3]: '-vv' Step #5: -arg[4]: 'y9🔩=GwyA' Step #5: +y9🔩=GwyA Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "-vv", "y9🔩=GwyA"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: y9🔩=GwyA Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: y9🔩=GwyA Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: y9🔩=GwyA Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (2201) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2201== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xde, Step #5: \336 Step #5: artifact_prefix='./'; Test unit written to ./crash-a3b63037f3b6d74fc4e7156f5cdcbd902e897d1d Step #5: Base64: 3g== Step #5: MERGE-OUTER: attempt 10 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032014905 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/a3b63037f3b6d74fc4e7156f5cdcbd902e897d1d' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 19 processed earlier; will process 238 files now Step #5: Running test ["env", "-i", "EpRdÃ=r"] Step #5: === Compare result for: env ["-i", "EpRdÃ=r"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "W=gXY", "🔗b=1o"] Step #5: === Compare result for: env ["-0", "W=gXY", "🔗b=1o"] Step #5: Rust stdout: Step #5: EpRdÃ=rW=gXY🔗b=1o Step #5: GNU stdout: Step #5: EpRdÃ=rLC_ALL=CW=gXY🔗b=1o Step #5: --- START diff Step #5: -EpRdÃ=rW=gXY🔗b=1o Step #5: +EpRdÃ=rLC_ALL=CW=gXY🔗b=1o Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "W=gXY", "🔗b=1o"] Step #5: Step #5: thread '' (2318) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "W=gXY", "🔗b=1o"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2318== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xe0, Step #5: \340 Step #5: artifact_prefix='./'; Test unit written to ./crash-c2204edbfb1b72c9e996a5e6464f6ab0198c494f Step #5: Base64: 4A== Step #5: MERGE-OUTER: attempt 11 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032034650 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c2204edbfb1b72c9e996a5e6464f6ab0198c494f' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 21 processed earlier; will process 236 files now Step #5: Running test ["env", "=gj🪛M"] Step #5: === Compare result for: env ["=gj🪛M"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =gj🪛M Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=gj🪛M Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=gj🪛M"] Step #5: Step #5: thread '' (2450) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=gj🪛M"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2450== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x33, Step #5: 3 Step #5: artifact_prefix='./'; Test unit written to ./crash-77de68daecd823babbb58edb1c8e14d7106e83bb Step #5: Base64: Mw== Step #5: MERGE-OUTER: attempt 12 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032050974 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/77de68daecd823babbb58edb1c8e14d7106e83bb' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 22 processed earlier; will process 235 files now Step #5: Running test ["env", "-0", "-v", "ÃZ=A"] Step #5: === Compare result for: env ["-0", "-v", "ÃZ=A"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workÃZ=A Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEÃZ=A Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workÃZ=A Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEÃZ=A Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: ÃZ=A Step #5: --- START diff Step #5: +ÃZ=A Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "ÃZ=A"] Step #5: Step #5: thread '' (2561) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "ÃZ=A"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2561== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xdf, Step #5: \337 Step #5: artifact_prefix='./'; Test unit written to ./crash-3fa5bfd93317ad25772680071d5ac3259cd2384f Step #5: Base64: 3w== Step #5: MERGE-OUTER: attempt 13 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032067054 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3fa5bfd93317ad25772680071d5ac3259cd2384f' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 23 processed earlier; will process 234 files now Step #5: Running test ["env", "nY7\u{fe0f}=(("] Step #5: === Compare result for: env ["nY7\u{fe0f}=(("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: nY7️=(( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: nY7️=(( Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: nY7️=(( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["nY7\u{fe0f}=(("] Step #5: Step #5: thread '' (2669) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["nY7\u{fe0f}=(("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2669== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xc8, Step #5: \310 Step #5: artifact_prefix='./'; Test unit written to ./crash-8c1e6ab4270792c51304ea06f47dc20ce51ba57b Step #5: Base64: yA== Step #5: MERGE-OUTER: attempt 14 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032083474 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/8c1e6ab4270792c51304ea06f47dc20ce51ba57b' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 24 processed earlier; will process 233 files now Step #5: Running test ["env", "-i", "-v", "Tnn5=🪛Jg🪓", "0eT=WÃ"] Step #5: === Compare result for: env ["-i", "-v", "Tnn5=🪛Jg🪓", "0eT=WÃ"] Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: Tnn5=🪛Jg🪓 Step #5: setenv: 0eT=Wà Step #5: --- START diff Step #5: +Tnn5=🪛Jg🪓 Step #5: +setenv: 0eT=Wà Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "Tnn5=🪛Jg🪓", "0eT=WÃ"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "U2nw=yNNU"] Step #5: === Compare result for: env ["U2nw=yNNU"] Step #5: Rust stdout: Step #5: Tnn5=🪛Jg🪓 Step #5: 0eT=Wà Step #5: U2nw=yNNU Step #5: Step #5: GNU stdout: Step #5: 0eT=Wà Step #5: LC_ALL=C Step #5: Tnn5=🪛Jg🪓 Step #5: U2nw=yNNU Step #5: Step #5: --- START diff Step #5: -Tnn5=🪛Jg🪓 Step #5: 0eT=Wà Step #5: +LC_ALL=C Step #5: +Tnn5=🪛Jg🪓 Step #5: U2nw=yNNU Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["U2nw=yNNU"] Step #5: Step #5: thread '' (2780) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["U2nw=yNNU"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2780== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x1f, Step #5: \037 Step #5: artifact_prefix='./'; Test unit written to ./crash-953efe8f531a5a87f6d2d5a65b78b05e55599abc Step #5: Base64: Hw== Step #5: MERGE-OUTER: attempt 15 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032102368 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/953efe8f531a5a87f6d2d5a65b78b05e55599abc' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 26 processed earlier; will process 231 files now Step #5: Running test ["env", "-u=xi"] Step #5: === Compare result for: env ["-u=xi"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=xi': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=xi': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=xi"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-u=KF", "(rUe=dnf", "S🪛gt=🪛xb"] Step #5: === Compare result for: env ["-0", "-u=KF", "(rUe=dnf", "S🪛gt=🪛xb"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=KF': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=KF': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=KF", "(rUe=dnf", "S🪛gt=🪛xb"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=uB"] Step #5: === Compare result for: env ["-u=uB"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=uB': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=uB': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=uB"] Step #5: Step #5: Running test ["env", "-vv", "R=🧰Lp"] Step #5: === Compare result for: env ["-vv", "R=🧰Lp"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: R=🧰Lp Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: R=🧰Lp Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +R=🧰Lp Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -R=🧰Lp Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'R=🧰Lp' Step #5: GNU stderr: Step #5: R=🧰Lp Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'R=🧰Lp' Step #5: +R=🧰Lp Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "R=🧰Lp"] Step #5: Step #5: thread '' (2930) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "R=🧰Lp"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2930== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x8e, Step #5: \216 Step #5: artifact_prefix='./'; Test unit written to ./crash-66b8c256f4b4f6ce36ec1abededf1826f91b05d2 Step #5: Base64: jg== Step #5: MERGE-OUTER: attempt 16 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032126442 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/66b8c256f4b4f6ce36ec1abededf1826f91b05d2' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 30 processed earlier; will process 227 files now Step #5: Running test ["env", "AA=", "l9lQy=FHCm"] Step #5: === Compare result for: env ["AA=", "l9lQy=FHCm"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: AA= Step #5: l9lQy=FHCm Step #5: Step #5: GNU stdout: Step #5: AA= Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: l9lQy=FHCm Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +AA= Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -AA= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: l9lQy=FHCm Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["AA=", "l9lQy=FHCm"] Step #5: Step #5: thread '' (3120) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["AA=", "l9lQy=FHCm"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3120== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x81, Step #5: \201 Step #5: artifact_prefix='./'; Test unit written to ./crash-a3f294235fe5422005ae9bc3a0d1bffe12cfe353 Step #5: Base64: gQ== Step #5: MERGE-OUTER: attempt 17 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032142556 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/a3f294235fe5422005ae9bc3a0d1bffe12cfe353' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 31 processed earlier; will process 226 files now Step #5: Running test ["env", "-0", "-vv", "-u=o", "Q=01z"] Step #5: === Compare result for: env ["-0", "-vv", "-u=o", "Q=01z"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =o Step #5: env: cannot unset '=o': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=o Step #5: +env: cannot unset '=o': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-vv", "-u=o", "Q=01z"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp", "f(G=hq", "v=ql("] Step #5: === Compare result for: env ["--chdir=/tmp", "f(G=hq", "v=ql("] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "f(G=hq", "v=ql("] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "5=", "h🔗⚙Fd=Sn"] Step #5: === Compare result for: env ["-i", "5=", "h🔗⚙Fd=Sn"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["env", "-i", "-0"] Step #5: === Compare result for: env ["-i", "-0"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (3214) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3214== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7, Step #5: \007 Step #5: artifact_prefix='./'; Test unit written to ./crash-5d1be7e9dda1ee8896be5b7e34a85ee16452a7b4 Step #5: Base64: Bw== Step #5: MERGE-OUTER: attempt 18 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032165078 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5d1be7e9dda1ee8896be5b7e34a85ee16452a7b4' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 36 processed earlier; will process 221 files now Step #5: Running test ["env", "-vv", "o🔩3t🧰=HhAmN"] Step #5: === Compare result for: env ["-vv", "o🔩3t🧰=HhAmN"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: o🔩3t🧰=HhAmN Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: o🔩3t🧰=HhAmN Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: o🔩3t🧰=HhAmN Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'o🔩3t🧰=HhAmN' Step #5: GNU stderr: Step #5: o🔩3t🧰=HhAmN Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'o🔩3t🧰=HhAmN' Step #5: +o🔩3t🧰=HhAmN Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "o🔩3t🧰=HhAmN"] Step #5: Step #5: thread '' (3362) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "o🔩3t🧰=HhAmN"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3362== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6b, Step #5: k Step #5: artifact_prefix='./'; Test unit written to ./crash-13fbd79c3d390e5d6585a21e11ff5ec1970cff0c Step #5: Base64: aw== Step #5: MERGE-OUTER: attempt 19 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032180582 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/13fbd79c3d390e5d6585a21e11ff5ec1970cff0c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 37 processed earlier; will process 220 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-v"] Step #5: === Compare result for: env ["-i", "-v"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (3452) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3452== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf3, Step #5: \363 Step #5: artifact_prefix='./'; Test unit written to ./crash-0a80baa1797615faddb0ccfaa6d46382a6b3e0e2 Step #5: Base64: 8w== Step #5: MERGE-OUTER: attempt 20 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032201973 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0a80baa1797615faddb0ccfaa6d46382a6b3e0e2' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 40 processed earlier; will process 217 files now Step #5: Running test ["env", "-v", "C=Ã", "Q=zrsh"] Step #5: === Compare result for: env ["-v", "C=Ã", "Q=zrsh"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: C=à Step #5: Q=zrsh Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: C=à Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: Q=zrsh Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: +C=à Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +Q=zrsh Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -C=à Step #5: -Q=zrsh Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: C=à Step #5: setenv: Q=zrsh Step #5: --- START diff Step #5: +C=à Step #5: +setenv: Q=zrsh Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "C=Ã", "Q=zrsh"] Step #5: Step #5: thread '' (3630) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "C=Ã", "Q=zrsh"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3630== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xd2, Step #5: \322 Step #5: artifact_prefix='./'; Test unit written to ./crash-f8998da85fb12d4e8a858d364ab485dfad0863b4 Step #5: Base64: 0g== Step #5: MERGE-OUTER: attempt 21 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032218809 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f8998da85fb12d4e8a858d364ab485dfad0863b4' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 41 processed earlier; will process 216 files now Step #5: Running test ["env", "-v", "L9="] Step #5: === Compare result for: env ["-v", "L9="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: L9= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: L9= Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +L9= Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -L9= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: L9= Step #5: --- START diff Step #5: +L9= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "L9="] Step #5: Step #5: thread '' (3747) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "L9="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3747== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7c, Step #5: | Step #5: artifact_prefix='./'; Test unit written to ./crash-3eb416223e9e69e6bb8ee19793911ad1ad2027d8 Step #5: Base64: fA== Step #5: MERGE-OUTER: attempt 22 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032234987 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3eb416223e9e69e6bb8ee19793911ad1ad2027d8' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 42 processed earlier; will process 215 files now Step #5: Running test ["env", "-v", "-u="] Step #5: === Compare result for: env ["-v", "-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "(7l=", "skv=P"] Step #5: === Compare result for: env ["(7l=", "skv=P"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: (7l= Step #5: skv=P Step #5: Step #5: GNU stdout: Step #5: (7l= Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: skv=P Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(7l= Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -(7l= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: skv=P Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["(7l=", "skv=P"] Step #5: Step #5: thread '' (3847) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["(7l=", "skv=P"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3847== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x52, Step #5: R Step #5: artifact_prefix='./'; Test unit written to ./crash-06576556d1ad802f247cad11ae748be47b70cd9c Step #5: Base64: Ug== Step #5: MERGE-OUTER: attempt 23 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032252457 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/06576556d1ad802f247cad11ae748be47b70cd9c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 44 processed earlier; will process 213 files now Step #5: Running test ["env", "-u=", "U4o="] Step #5: === Compare result for: env ["-u=", "U4o="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "U4o="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv", "-u=Ek0wo0🪓B", "YJK=Z", "kN="] Step #5: === Compare result for: env ["-vv", "-u=Ek0wo0🪓B", "YJK=Z", "kN="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =Ek0wo0🪓B Step #5: env: cannot unset '=Ek0wo0\360\237\252\223B': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=Ek0wo0🪓B Step #5: +env: cannot unset '=Ek0wo0\360\237\252\223B': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=Ek0wo0🪓B", "YJK=Z", "kN="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv", "-u=", "--chdir=/tmp", "=", "5Ãae=lAUP"] Step #5: === Compare result for: env ["-vv", "-u=", "--chdir=/tmp", "=", "5Ãae=lAUP"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=", "--chdir=/tmp", "=", "5Ãae=lAUP"] Step #5: Step #5: Running test ["env", "-0", "-vv", "-u="] Step #5: === Compare result for: env ["-0", "-vv", "-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-vv", "-u="] Step #5: Step #5: #4 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=", "ÃYMg=6"] Step #5: === Compare result for: env ["-u=", "ÃYMg=6"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "ÃYMg=6"] Step #5: Step #5: Running test ["env", "-v", "--chdir=/tmp"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp"] Step #5: Step #5: Running test ["env", "-u=", "--chdir=/tmp"] Step #5: === Compare result for: env ["-u=", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "--chdir=/tmp"] Step #5: Step #5: Running test ["env", "--chdir=/tmp", "mS🪛E=TEÃmb", "🧰mXk="] Step #5: === Compare result for: env ["--chdir=/tmp", "mS🪛E=TEÃmb", "🧰mXk="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "mS🪛E=TEÃmb", "🧰mXk="] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "=lL7"] Step #5: === Compare result for: env ["=lL7"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =lL7 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=lL7 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=lL7"] Step #5: Step #5: thread '' (3996) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=lL7"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3996== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf4, Step #5: \364 Step #5: artifact_prefix='./'; Test unit written to ./crash-b48f491783e98de10682f2d4455dfce5bdc3c233 Step #5: Base64: 9A== Step #5: MERGE-OUTER: attempt 24 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032284738 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b48f491783e98de10682f2d4455dfce5bdc3c233' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 53 processed earlier; will process 204 files now Step #5: Running test ["env", "-0", "eA(le=lO3🪓9"] Step #5: === Compare result for: env ["-0", "eA(le=lO3🪓9"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workeA(le=lO3🪓9 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEeA(le=lO3🪓9 Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workeA(le=lO3🪓9 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEeA(le=lO3🪓9 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "eA(le=lO3🪓9"] Step #5: Step #5: thread '' (4237) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "eA(le=lO3🪓9"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4237== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x1c, Step #5: \034 Step #5: artifact_prefix='./'; Test unit written to ./crash-b830c46d24068069f0a43687826f355b21fdb941 Step #5: Base64: HA== Step #5: MERGE-OUTER: attempt 25 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032299880 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b830c46d24068069f0a43687826f355b21fdb941' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 54 processed earlier; will process 203 files now Step #5: Running test ["env", "-v", "-u=5e"] Step #5: === Compare result for: env ["-v", "-u=5e"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =5e Step #5: env: cannot unset '=5e': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=5e Step #5: +env: cannot unset '=5e': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=5e"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "2🔩h9O=w🪛JTV", "=QCCM⚙"] Step #5: === Compare result for: env ["2🔩h9O=w🪛JTV", "=QCCM⚙"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 2🔩h9O=w🪛JTV Step #5: Step #5: GNU stdout: Step #5: 2🔩h9O=w🪛JTV Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =QCCM⚙ Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +2🔩h9O=w🪛JTV Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -2🔩h9O=w🪛JTV Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=QCCM⚙ Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["2🔩h9O=w🪛JTV", "=QCCM⚙"] Step #5: Step #5: thread '' (4314) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["2🔩h9O=w🪛JTV", "=QCCM⚙"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4314== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x28,0x7a, Step #5: (z Step #5: artifact_prefix='./'; Test unit written to ./crash-c9c48b5d5a2c74dc729b240fc9b2fb71b4cdb7b9 Step #5: Base64: KHo= Step #5: MERGE-OUTER: attempt 26 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032318007 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c9c48b5d5a2c74dc729b240fc9b2fb71b4cdb7b9' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 56 processed earlier; will process 201 files now Step #5: Running test ["env", "-u=oMGrt9"] Step #5: === Compare result for: env ["-u=oMGrt9"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=oMGrt9': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=oMGrt9': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=oMGrt9"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-0", "H(Ã=K"] Step #5: === Compare result for: env ["-i", "-0", "H(Ã=K"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv", "OgwA=🪛5((", "="] Step #5: === Compare result for: env ["-vv", "OgwA=🪛5((", "="] Step #5: Rust stdout: Step #5: H(Ã=K Step #5: OgwA=🪛5(( Step #5: Step #5: GNU stdout: Step #5: H(Ã=K Step #5: LC_ALL=C Step #5: OgwA=🪛5(( Step #5: = Step #5: Step #5: --- START diff Step #5: H(Ã=K Step #5: +LC_ALL=C Step #5: OgwA=🪛5(( Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'OgwA=🪛5((' Step #5: arg[3]: '=' Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: OgwA=🪛5(( Step #5: setenv: = Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'OgwA=🪛5((' Step #5: -arg[3]: '=' Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: warning: env-warning-no-name-specified Step #5: +OgwA=🪛5(( Step #5: +setenv: = Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "OgwA=🪛5((", "="] Step #5: Step #5: thread '' (4448) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "OgwA=🪛5((", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4448== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x56,0xe3, Step #5: V\343 Step #5: artifact_prefix='./'; Test unit written to ./crash-b9e37a898090f64c832e2efa1b4991e1e5fd2149 Step #5: Base64: VuM= Step #5: MERGE-OUTER: attempt 27 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032338307 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b9e37a898090f64c832e2efa1b4991e1e5fd2149' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 59 processed earlier; will process 198 files now Step #5: Running test ["env", "-vv", "--chdir=/tmp", "T=YÃÃD", "r🪓=aMs"] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp", "T=YÃÃD", "r🪓=aMs"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: arg[3]: 'T=YÃÃD' Step #5: arg[4]: 'r🪓=aMs' Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: T=YÃÃD Step #5: setenv: r🪓=aMs Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -arg[3]: 'T=YÃÃD' Step #5: -arg[4]: 'r🪓=aMs' Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +T=YÃÃD Step #5: +setenv: r🪓=aMs Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp", "T=YÃÃD", "r🪓=aMs"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-vv", "⚙xCg0=G🧰\u{fe0f}y", "PjWf=3"] Step #5: === Compare result for: env ["-vv", "⚙xCg0=G🧰\u{fe0f}y", "PjWf=3"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: ⚙xCg0=G🧰️y Step #5: PjWf=3 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PjWf=3 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ⚙xCg0=G🧰️y Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +PjWf=3 Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ⚙xCg0=G🧰️y Step #5: -PjWf=3 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '⚙xCg0=G🧰️y' Step #5: arg[3]: 'PjWf=3' Step #5: GNU stderr: Step #5: ⚙xCg0=G🧰️y Step #5: setenv: PjWf=3 Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '⚙xCg0=G🧰️y' Step #5: -arg[3]: 'PjWf=3' Step #5: +⚙xCg0=G🧰️y Step #5: +setenv: PjWf=3 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "⚙xCg0=G🧰\u{fe0f}y", "PjWf=3"] Step #5: Step #5: thread '' (4568) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "⚙xCg0=G🧰\u{fe0f}y", "PjWf=3"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4568== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x30, Step #5: S0 Step #5: artifact_prefix='./'; Test unit written to ./crash-cc0b3193242e139b12956fab5ab2ec246f05d573 Step #5: Base64: UzA= Step #5: MERGE-OUTER: attempt 28 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032359131 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/cc0b3193242e139b12956fab5ab2ec246f05d573' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 61 processed earlier; will process 196 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (4687) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4687== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa,0xa, Step #5: \012\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-71853c6197a6a7f222db0f1978c7cb232b87c5ee Step #5: Base64: Cgo= Step #5: MERGE-OUTER: attempt 29 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032375383 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/71853c6197a6a7f222db0f1978c7cb232b87c5ee' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 62 processed earlier; will process 195 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (4772) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4772== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0xff, Step #5: \000\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-aa3e5dcdd77b153f2e59bd0d8794fde33cb4e486 Step #5: Base64: AP8= Step #5: MERGE-OUTER: attempt 30 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032394829 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/aa3e5dcdd77b153f2e59bd0d8794fde33cb4e486' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 63 processed earlier; will process 194 files now Step #5: Running test ["env", "-v", "-u=5PHÃisi"] Step #5: === Compare result for: env ["-v", "-u=5PHÃisi"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =5PHÃisi Step #5: env: cannot unset '=5PH\303\203isi': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=5PHÃisi Step #5: +env: cannot unset '=5PH\303\203isi': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=5PHÃisi"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "(J=cO"] Step #5: === Compare result for: env ["-v", "(J=cO"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: (J=cO Step #5: Step #5: GNU stdout: Step #5: (J=cO Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(J=cO Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -(J=cO Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: (J=cO Step #5: --- START diff Step #5: +(J=cO Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "(J=cO"] Step #5: Step #5: thread '' (4905) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "(J=cO"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4905== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xdd,0xdc, Step #5: \335\334 Step #5: artifact_prefix='./'; Test unit written to ./crash-081c376d7793a439485cf1df073ca0a798290f0e Step #5: Base64: 3dw= Step #5: MERGE-OUTER: attempt 31 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032413517 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/081c376d7793a439485cf1df073ca0a798290f0e' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 65 processed earlier; will process 192 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (5002) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5002== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x74, Step #5: St Step #5: artifact_prefix='./'; Test unit written to ./crash-ea7bc98ccc54fb75c0e9353c966cdae8df3dad3b Step #5: Base64: U3Q= Step #5: MERGE-OUTER: attempt 32 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032429695 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ea7bc98ccc54fb75c0e9353c966cdae8df3dad3b' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 66 processed earlier; will process 191 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (5096) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5096== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x25,0xd, Step #5: %\015 Step #5: artifact_prefix='./'; Test unit written to ./crash-2bbc8754699f724bd13f3778263693fc0ed8dcdd Step #5: Base64: JQ0= Step #5: MERGE-OUTER: attempt 33 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032445577 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2bbc8754699f724bd13f3778263693fc0ed8dcdd' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 67 processed earlier; will process 190 files now Step #5: Running test ["env", "-0", "--chdir=/tmp", "p6(k=aR", "=ti6yQ"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "p6(k=aR", "=ti6yQ"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "p6(k=aR", "=ti6yQ"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-0", "opDÃb=dceV", "y(=Ary1I"] Step #5: === Compare result for: env ["-i", "-0", "opDÃb=dceV", "y(=Ary1I"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-u=KCUS0YMy", "--chdir=/tmp", "VXzjW=🪓f🔗ZO"] Step #5: === Compare result for: env ["-v", "-u=KCUS0YMy", "--chdir=/tmp", "VXzjW=🪓f🔗ZO"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =KCUS0YMy Step #5: env: cannot unset '=KCUS0YMy': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=KCUS0YMy Step #5: +env: cannot unset '=KCUS0YMy': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=KCUS0YMy", "--chdir=/tmp", "VXzjW=🪓f🔗ZO"] Step #5: Step #5: Running test ["env", "-i", "-0", "kJCa=yzv1(", "ucÃW=R"] Step #5: === Compare result for: env ["-i", "-0", "kJCa=yzv1(", "ucÃW=R"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: kJCa=yzv1( Step #5: ucÃW=R Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: kJCa=yzv1( Step #5: ucÃW=R Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: kJCa=yzv1( Step #5: ucÃW=R Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (5192) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5192== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x47,0xe1, Step #5: G\341 Step #5: artifact_prefix='./'; Test unit written to ./crash-183aef59ee90e0656ce281262e5f489064dac315 Step #5: Base64: R+E= Step #5: MERGE-OUTER: attempt 34 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032468283 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/183aef59ee90e0656ce281262e5f489064dac315' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 72 processed earlier; will process 185 files now Step #5: Running test ["env", "-i", "-u=kmWnpC", "--chdir=/tmp"] Step #5: === Compare result for: env ["-i", "-u=kmWnpC", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-u=kmWnpC", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=w("] Step #5: === Compare result for: env ["-u=w("] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=w(': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=w(': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=w("] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (5340) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5340== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xff,0x70, Step #5: \377p Step #5: artifact_prefix='./'; Test unit written to ./crash-4a2877cd59aae7faad41dc55ddf9ace3b06857a0 Step #5: Base64: /3A= Step #5: MERGE-OUTER: attempt 35 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032488495 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/4a2877cd59aae7faad41dc55ddf9ace3b06857a0' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 75 processed earlier; will process 182 files now Step #5: Running test ["env", "-0"] Step #5: === Compare result for: env ["-0"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0"] Step #5: Step #5: thread '' (5468) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5468== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2,0x2, Step #5: \002\002 Step #5: artifact_prefix='./'; Test unit written to ./crash-df9e7e9f6dc5365fbccfc282fe99c2f758d7dd4a Step #5: Base64: AgI= Step #5: MERGE-OUTER: attempt 36 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032504528 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/df9e7e9f6dc5365fbccfc282fe99c2f758d7dd4a' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 76 processed earlier; will process 181 files now Step #5: Running test ["env", "--chdir=/tmp", "8M5="] Step #5: === Compare result for: env ["--chdir=/tmp", "8M5="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "8M5="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (5556) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5556== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x82,0x0, Step #5: \202\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-b34b8fca7d22b9e512c28922f34b6133c462b748 Step #5: Base64: ggA= Step #5: MERGE-OUTER: attempt 37 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032524642 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b34b8fca7d22b9e512c28922f34b6133c462b748' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 78 processed earlier; will process 179 files now Step #5: Running test ["env", "=rG1K"] Step #5: === Compare result for: env ["=rG1K"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =rG1K Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=rG1K Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=rG1K"] Step #5: Step #5: thread '' (5679) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=rG1K"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5679== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x1,0x0, Step #5: \001\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-0e356ba505631fbf715758bed27d503f8b260e3a Step #5: Base64: AQA= Step #5: MERGE-OUTER: attempt 38 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032541816 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0e356ba505631fbf715758bed27d503f8b260e3a' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 79 processed earlier; will process 178 files now Step #5: Running test ["env", "-0", "-vv", "tcKY=eK", "Or=OSxU"] Step #5: === Compare result for: env ["-0", "-vv", "tcKY=eK", "Or=OSxU"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/worktcKY=eKOr=OSxU Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64Or=OSxUPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEtcKY=eK Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/worktcKY=eKOr=OSxU Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64Or=OSxUPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEtcKY=eK Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-vv' Step #5: arg[3]: 'tcKY=eK' Step #5: arg[4]: 'Or=OSxU' Step #5: GNU stderr: Step #5: tcKY=eK Step #5: setenv: Or=OSxU Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: 'tcKY=eK' Step #5: -arg[4]: 'Or=OSxU' Step #5: +tcKY=eK Step #5: +setenv: Or=OSxU Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-vv", "tcKY=eK", "Or=OSxU"] Step #5: Step #5: thread '' (5767) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-vv", "tcKY=eK", "Or=OSxU"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5767== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x56,0xef, Step #5: V\357 Step #5: artifact_prefix='./'; Test unit written to ./crash-64e289b64262b3f288178071690bb3408985dda1 Step #5: Base64: Vu8= Step #5: MERGE-OUTER: attempt 39 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032561008 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/64e289b64262b3f288178071690bb3408985dda1' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 80 processed earlier; will process 177 files now Step #5: Running test ["env", "-u=q0Ãu6", "99E9=6ÃpO🔩", "TR=🔗2⚙"] Step #5: === Compare result for: env ["-u=q0Ãu6", "99E9=6ÃpO🔩", "TR=🔗2⚙"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=q0\303\203u6': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=q0\303\203u6': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=q0Ãu6", "99E9=6ÃpO🔩", "TR=🔗2⚙"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=L0s50"] Step #5: === Compare result for: env ["-u=L0s50"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=L0s50': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=L0s50': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=L0s50"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "q(2=9Jc", "lCT=EF"] Step #5: === Compare result for: env ["q(2=9Jc", "lCT=EF"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: q(2=9Jc Step #5: lCT=EF Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: lCT=EF Step #5: q(2=9Jc Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -q(2=9Jc Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: lCT=EF Step #5: +q(2=9Jc Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["q(2=9Jc", "lCT=EF"] Step #5: Step #5: thread '' (5870) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["q(2=9Jc", "lCT=EF"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5870== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x23,0x23,0x23, Step #5: ### Step #5: artifact_prefix='./'; Test unit written to ./crash-5c5b8251bdb4b62eff8c746f4021483bfae24eb7 Step #5: Base64: IyMj Step #5: MERGE-OUTER: attempt 40 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032580973 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5c5b8251bdb4b62eff8c746f4021483bfae24eb7' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 83 processed earlier; will process 174 files now Step #5: Running test ["env", "-v", "-vv", "mPq=\u{fe0f}O", "i=H(E"] Step #5: === Compare result for: env ["-v", "-vv", "mPq=\u{fe0f}O", "i=H(E"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: mPq=️O Step #5: i=H(E Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: i=H(E Step #5: mPq=️O Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -mPq=️O Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: i=H(E Step #5: +mPq=️O Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: arg[3]: 'mPq=️O' Step #5: arg[4]: 'i=H(E' Step #5: GNU stderr: Step #5: mPq=️O Step #5: setenv: i=H(E Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: 'mPq=️O' Step #5: -arg[4]: 'i=H(E' Step #5: +mPq=️O Step #5: +setenv: i=H(E Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "-vv", "mPq=\u{fe0f}O", "i=H(E"] Step #5: Step #5: thread '' (6004) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "-vv", "mPq=\u{fe0f}O", "i=H(E"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6004== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x38,0x48,0x28, Step #5: 8H( Step #5: artifact_prefix='./'; Test unit written to ./crash-0a8b16f20e8f990514a8dbb48023e82e96ebefa9 Step #5: Base64: OEgo Step #5: MERGE-OUTER: attempt 41 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032597668 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0a8b16f20e8f990514a8dbb48023e82e96ebefa9' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 84 processed earlier; will process 173 files now Step #5: Running test ["env", "-vv", "--chdir=/tmp", "r\u{fe0f}=iÃoU"] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp", "r\u{fe0f}=iÃoU"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: arg[3]: 'r️=iÃoU' Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: r️=iÃoU Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -arg[3]: 'r️=iÃoU' Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +r️=iÃoU Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp", "r\u{fe0f}=iÃoU"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-vv"] Step #5: === Compare result for: env ["-i", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["env", "-u=", "6=PSQ7U", "Yv8x(=pLl"] Step #5: === Compare result for: env ["-u=", "6=PSQ7U", "Yv8x(=pLl"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "6=PSQ7U", "Yv8x(=pLl"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "=kVa3S", "T\u{fe0f}=⚙wb9P"] Step #5: === Compare result for: env ["=kVa3S", "T\u{fe0f}=⚙wb9P"] Step #5: Rust stdout: Step #5: T️=⚙wb9P Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: T️=⚙wb9P Step #5: =kVa3S Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: T️=⚙wb9P Step #5: +=kVa3S Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=kVa3S", "T\u{fe0f}=⚙wb9P"] Step #5: Step #5: thread '' (6100) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=kVa3S", "T\u{fe0f}=⚙wb9P"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6100== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xdf,0xa9,0x1e, Step #5: \337\251\036 Step #5: artifact_prefix='./'; Test unit written to ./crash-de605859c68fc62ab1ce4eb3a2541dfd4b254eed Step #5: Base64: 36ke Step #5: MERGE-OUTER: attempt 42 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032621087 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/de605859c68fc62ab1ce4eb3a2541dfd4b254eed' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 89 processed earlier; will process 168 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (6235) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6235== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x20,0x20,0x20, Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-088fb1a4ab057f4fcf7d487006499060c7fe5773 Step #5: Base64: ICAg Step #5: MERGE-OUTER: attempt 43 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032637011 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/088fb1a4ab057f4fcf7d487006499060c7fe5773' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 90 processed earlier; will process 167 files now Step #5: Running test ["env", "-v", "--chdir=/tmp", "=G"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "=G"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: =G Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +=G Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "=G"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "-vv", "-u=5", "KCK2=J\u{fe0f}j\u{fe0f}"] Step #5: === Compare result for: env ["-v", "-vv", "-u=5", "KCK2=J\u{fe0f}j\u{fe0f}"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =5 Step #5: env: cannot unset '=5': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=5 Step #5: +env: cannot unset '=5': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "-u=5", "KCK2=J\u{fe0f}j\u{fe0f}"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "Q=4I(o"] Step #5: === Compare result for: env ["Q=4I(o"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Q=4I(o Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: Q=4I(o Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +Q=4I(o Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -Q=4I(o Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["Q=4I(o"] Step #5: Step #5: thread '' (6320) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Q=4I(o"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6320== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x68,0x69,0x70, Step #5: hip Step #5: artifact_prefix='./'; Test unit written to ./crash-ae763d5994a0e223cf98c371ed357c9851c01813 Step #5: Base64: aGlw Step #5: MERGE-OUTER: attempt 44 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032657431 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ae763d5994a0e223cf98c371ed357c9851c01813' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 93 processed earlier; will process 164 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (6413) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6413== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x25,0x25,0xff, Step #5: %%\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-f40595265f804dda55cd7ab5f1d458b6580ba077 Step #5: Base64: JSX/ Step #5: MERGE-OUTER: attempt 45 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032674480 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f40595265f804dda55cd7ab5f1d458b6580ba077' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 94 processed earlier; will process 163 files now Step #5: Running test ["env", "-v", "O=", "aVca=FYy"] Step #5: === Compare result for: env ["-v", "O=", "aVca=FYy"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: O= Step #5: aVca=FYy Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: O= Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aVca=FYy Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +O= Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -O= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aVca=FYy Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: O= Step #5: setenv: aVca=FYy Step #5: --- START diff Step #5: +O= Step #5: +setenv: aVca=FYy Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "O=", "aVca=FYy"] Step #5: Step #5: thread '' (6497) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "O=", "aVca=FYy"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6497== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7d,0x30,0x30, Step #5: }00 Step #5: artifact_prefix='./'; Test unit written to ./crash-97ffbf57c3b1993fc45a1e2f151df56353e96bd8 Step #5: Base64: fTAw Step #5: MERGE-OUTER: attempt 46 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032691638 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/97ffbf57c3b1993fc45a1e2f151df56353e96bd8' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 95 processed earlier; will process 162 files now Step #5: Running test ["env", "-0", "-u=BhW", "wnZf=CIy"] Step #5: === Compare result for: env ["-0", "-u=BhW", "wnZf=CIy"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=BhW': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=BhW': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=BhW", "wnZf=CIy"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-v", "1c=1"] Step #5: === Compare result for: env ["-i", "-v", "1c=1"] Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 1c=1 Step #5: --- START diff Step #5: +1c=1 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "1c=1"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv", "--chdir=/tmp", "QN=9YM", "🪛1uue=SÃ"] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp", "QN=9YM", "🪛1uue=SÃ"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: arg[3]: 'QN=9YM' Step #5: arg[4]: '🪛1uue=SÃ' Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: QN=9YM Step #5: setenv: 🪛1uue=Sà Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -arg[3]: 'QN=9YM' Step #5: -arg[4]: '🪛1uue=SÃ' Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +QN=9YM Step #5: +setenv: 🪛1uue=Sà Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp", "QN=9YM", "🪛1uue=SÃ"] Step #5: Step #5: Running test ["env", "-i", "d=9", "=kTj"] Step #5: === Compare result for: env ["-i", "d=9", "=kTj"] Step #5: Rust stdout: Step #5: d=9 Step #5: Step #5: GNU stdout: Step #5: d=9 Step #5: =kTj Step #5: Step #5: --- START diff Step #5: d=9 Step #5: +=kTj Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "d=9", "=kTj"] Step #5: Step #5: thread '' (6588) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "d=9", "=kTj"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6588== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0xff,0x17, Step #5: P\377\027 Step #5: artifact_prefix='./'; Test unit written to ./crash-7f6e1bc584cdd31d26c5617ceb90886eceb4b7a6 Step #5: Base64: UP8X Step #5: MERGE-OUTER: attempt 47 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032712570 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7f6e1bc584cdd31d26c5617ceb90886eceb4b7a6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 99 processed earlier; will process 158 files now Step #5: Running test ["env", "UA=NoaM2"] Step #5: === Compare result for: env ["UA=NoaM2"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: UA=NoaM2 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UA=NoaM2 Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: -WORK=/work Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: UA=NoaM2 Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["UA=NoaM2"] Step #5: Step #5: thread '' (6684) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["UA=NoaM2"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6684== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x73,0x73,0x30, Step #5: ss0 Step #5: artifact_prefix='./'; Test unit written to ./crash-46661bbb606b34e3befc58df60c6fb7b268bb3da Step #5: Base64: c3Mw Step #5: MERGE-OUTER: attempt 48 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032728028 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/46661bbb606b34e3befc58df60c6fb7b268bb3da' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 100 processed earlier; will process 157 files now Step #5: Running test ["env", "-i", "IJDp=Z9gab", "6sr="] Step #5: === Compare result for: env ["-i", "IJDp=Z9gab", "6sr="] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-v", "-vv", "-u=rs", "=k4", "Yi=H3"] Step #5: === Compare result for: env ["-i", "-v", "-vv", "-u=rs", "=k4", "Yi=H3"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: =k4 Step #5: Yi=H3 Step #5: Step #5: --- START diff Step #5: +=k4 Step #5: +Yi=H3 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =k4 Step #5: setenv: Yi=H3 Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=k4 Step #5: +setenv: Yi=H3 Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-v", "-vv", "-u=rs", "=k4", "Yi=H3"] Step #5: Step #5: thread '' (6781) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-v", "-vv", "-u=rs", "=k4", "Yi=H3"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6781== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x70,0x6d,0x76,0x4, Step #5: pmv\004 Step #5: artifact_prefix='./'; Test unit written to ./crash-c4603dee5a5fc9b372496f7979e9dad6149dd526 Step #5: Base64: cG12BA== Step #5: MERGE-OUTER: attempt 49 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032747306 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c4603dee5a5fc9b372496f7979e9dad6149dd526' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 103 processed earlier; will process 154 files now Step #5: Running test ["env", "-u=jk", "--chdir=/tmp"] Step #5: === Compare result for: env ["-u=jk", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=jk': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=jk': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=jk", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "-vv", "-u=\u{fe0f}g🧰cÃ", "Hd4=", "🔩gi(=sq"] Step #5: === Compare result for: env ["-v", "-vv", "-u=\u{fe0f}g🧰cÃ", "Hd4=", "🔩gi(=sq"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =️g🧰cà Step #5: env: cannot unset '=\357\270\217g\360\237\247\260c\303\203': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=️g🧰cà Step #5: +env: cannot unset '=\357\270\217g\360\237\247\260c\303\203': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "-u=\u{fe0f}g🧰cÃ", "Hd4=", "🔩gi(=sq"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (6869) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6869== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x2d,0x30,0x0, Step #5: P-0\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-340abe12214155ffa1686ac2de6c38acf93576ef Step #5: Base64: UC0wAA== Step #5: MERGE-OUTER: attempt 50 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032765770 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/340abe12214155ffa1686ac2de6c38acf93576ef' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 106 processed earlier; will process 151 files now Step #5: Running test ["env", "-i", "--chdir=/tmp", "3o=🧰🔩4u", "pTB=🪛pTC"] Step #5: === Compare result for: env ["-i", "--chdir=/tmp", "3o=🧰🔩4u", "pTB=🪛pTC"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "--chdir=/tmp", "3o=🧰🔩4u", "pTB=🪛pTC"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-v", "-vv", "🧰=YYuX", "IM1=ÃÃV"] Step #5: === Compare result for: env ["-i", "-v", "-vv", "🧰=YYuX", "IM1=ÃÃV"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-v' Step #5: arg[3]: '-vv' Step #5: arg[4]: '🧰=YYuX' Step #5: arg[5]: 'IM1=ÃÃV' Step #5: GNU stderr: Step #5: 🧰=YYuX Step #5: setenv: IM1=ÃÃV Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-v' Step #5: -arg[3]: '-vv' Step #5: -arg[4]: '🧰=YYuX' Step #5: -arg[5]: 'IM1=ÃÃV' Step #5: +🧰=YYuX Step #5: +setenv: IM1=ÃÃV Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "-vv", "🧰=YYuX", "IM1=ÃÃV"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-u=🧰UHl", "=SF4"] Step #5: === Compare result for: env ["-v", "-u=🧰UHl", "=SF4"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =🧰UHl Step #5: env: cannot unset '=\360\237\247\260UHl': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=🧰UHl Step #5: +env: cannot unset '=\360\237\247\260UHl': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=🧰UHl", "=SF4"] Step #5: Step #5: Running test ["env", "-v", "-vv", "--chdir=/tmp", "C=Bgg", "wAZw=Hw"] Step #5: === Compare result for: env ["-v", "-vv", "--chdir=/tmp", "C=Bgg", "wAZw=Hw"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: arg[3]: '--chdir=/tmp' Step #5: arg[4]: 'C=Bgg' Step #5: arg[5]: 'wAZw=Hw' Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: C=Bgg Step #5: setenv: wAZw=Hw Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: '--chdir=/tmp' Step #5: -arg[4]: 'C=Bgg' Step #5: -arg[5]: 'wAZw=Hw' Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +C=Bgg Step #5: +setenv: wAZw=Hw Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "--chdir=/tmp", "C=Bgg", "wAZw=Hw"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-0", "-v", "-vv"] Step #5: === Compare result for: env ["-i", "-0", "-v", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-0' Step #5: arg[3]: '-v' Step #5: arg[4]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-0' Step #5: -arg[3]: '-v' Step #5: -arg[4]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "-v", "-vv"] Step #5: Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (6974) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6974== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x56,0xe0,0x0,0xb2, Step #5: V\340\000\262 Step #5: artifact_prefix='./'; Test unit written to ./crash-eeda6c2258b2b63a7538842eb044cb818c9cc889 Step #5: Base64: VuAAsg== Step #5: MERGE-OUTER: attempt 51 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032790220 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/eeda6c2258b2b63a7538842eb044cb818c9cc889' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 112 processed earlier; will process 145 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "b=EfLk"] Step #5: === Compare result for: env ["-v", "b=EfLk"] Step #5: Rust stdout: Step #5: b=EfLk Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: b=EfLk Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: b=EfLk Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: b=EfLk Step #5: --- START diff Step #5: +b=EfLk Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "b=EfLk"] Step #5: Step #5: thread '' (7146) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "b=EfLk"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7146== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x66,0x21,0x3d,0x81, Step #5: f!=\201 Step #5: artifact_prefix='./'; Test unit written to ./crash-4474d1aeff038f3003b48ed6727655831a846269 Step #5: Base64: ZiE9gQ== Step #5: MERGE-OUTER: attempt 52 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032807071 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/4474d1aeff038f3003b48ed6727655831a846269' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 114 processed earlier; will process 143 files now Step #5: Running test ["env", "⚙bAR=gT3J3", "j=⚙Qu"] Step #5: === Compare result for: env ["⚙bAR=gT3J3", "j=⚙Qu"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: ⚙bAR=gT3J3 Step #5: j=⚙Qu Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: j=⚙Qu Step #5: ⚙bAR=gT3J3 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -⚙bAR=gT3J3 Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: j=⚙Qu Step #5: +⚙bAR=gT3J3 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["⚙bAR=gT3J3", "j=⚙Qu"] Step #5: Step #5: thread '' (7262) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["⚙bAR=gT3J3", "j=⚙Qu"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7262== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x37,0x20,0x31, Step #5: P7 1 Step #5: artifact_prefix='./'; Test unit written to ./crash-779a64d012298c8f171034ae793674e3a207ec1d Step #5: Base64: UDcgMQ== Step #5: MERGE-OUTER: attempt 53 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032823807 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/779a64d012298c8f171034ae793674e3a207ec1d' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 115 processed earlier; will process 142 files now Step #5: Running test ["env", "-i", "-vv"] Step #5: === Compare result for: env ["-i", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "--chdir=/tmp"] Step #5: === Compare result for: env ["-i", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "--chdir=/tmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "--chdir=/tmp", "🔗T1🔗t=Nn7(J"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "🔗T1🔗t=Nn7(J"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: 🔗T1🔗t=Nn7(J Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +🔗T1🔗t=Nn7(J Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "🔗T1🔗t=Nn7(J"] Step #5: Step #5: Running test ["env", "myh0=L6", "nC=OncC"] Step #5: === Compare result for: env ["myh0=L6", "nC=OncC"] Step #5: Rust stdout: Step #5: myh0=L6 Step #5: nC=OncC Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: myh0=L6 Step #5: nC=OncC Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: myh0=L6 Step #5: nC=OncC Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["myh0=L6", "nC=OncC"] Step #5: Step #5: thread '' (7365) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["myh0=L6", "nC=OncC"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7365== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x37,0x21,0x21, Step #5: P7!! Step #5: artifact_prefix='./'; Test unit written to ./crash-6391765df4aa055b2cd1e354846c919a9ebf39b1 Step #5: Base64: UDchIQ== Step #5: MERGE-OUTER: attempt 54 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032846117 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/6391765df4aa055b2cd1e354846c919a9ebf39b1' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 119 processed earlier; will process 138 files now Step #5: Running test ["env", "-u=ts"] Step #5: === Compare result for: env ["-u=ts"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=ts': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=ts': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=ts"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "iHNt=O3D(", "8qMSj=kL6KÃ"] Step #5: === Compare result for: env ["-i", "iHNt=O3D(", "8qMSj=kL6KÃ"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=oo", "vnkZ=i", "z(K(=y"] Step #5: === Compare result for: env ["-u=oo", "vnkZ=i", "z(K(=y"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=oo': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=oo': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=oo", "vnkZ=i", "z(K(=y"] Step #5: Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: iHNt=O3D( Step #5: 8qMSj=kL6Kà Step #5: Step #5: GNU stdout: Step #5: 8qMSj=kL6Kà Step #5: LC_ALL=C Step #5: iHNt=O3D( Step #5: Step #5: --- START diff Step #5: -iHNt=O3D( Step #5: 8qMSj=kL6Kà Step #5: +LC_ALL=C Step #5: +iHNt=O3D( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (7476) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7476== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x2d,0x5b,0x46, Step #5: .-[F Step #5: artifact_prefix='./'; Test unit written to ./crash-77bd8bc011fd1f5ee80fa27794e14e191829b9d4 Step #5: Base64: Li1bRg== Step #5: MERGE-OUTER: attempt 55 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032867434 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/77bd8bc011fd1f5ee80fa27794e14e191829b9d4' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 123 processed earlier; will process 134 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "rb=ÃHE"] Step #5: === Compare result for: env ["-i", "rb=ÃHE"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-vv", "-u=0ou9", "7c=⚙5Nij", "D=gI"] Step #5: === Compare result for: env ["-i", "-vv", "-u=0ou9", "7c=⚙5Nij", "D=gI"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: 7c=⚙5Nij Step #5: D=gI Step #5: Step #5: --- START diff Step #5: +7c=⚙5Nij Step #5: +D=gI Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: 7c=⚙5Nij Step #5: setenv: D=gI Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +7c=⚙5Nij Step #5: +setenv: D=gI Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-vv", "-u=0ou9", "7c=⚙5Nij", "D=gI"] Step #5: Step #5: thread '' (7592) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-vv", "-u=0ou9", "7c=⚙5Nij", "D=gI"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7592== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7,0x0,0xde,0x23, Step #5: \007\000\336# Step #5: artifact_prefix='./'; Test unit written to ./crash-349a33db600592a2941afdcc6645e85214611e98 Step #5: Base64: BwDeIw== Step #5: MERGE-OUTER: attempt 56 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032888743 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/349a33db600592a2941afdcc6645e85214611e98' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 126 processed earlier; will process 131 files now Step #5: Running test ["env", "-0", "-u=B", "yS=B\u{fe0f}Cx"] Step #5: === Compare result for: env ["-0", "-u=B", "yS=B\u{fe0f}Cx"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=B': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=B': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=B", "yS=B\u{fe0f}Cx"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "nA=CWz5", "8SvA=cXH"] Step #5: === Compare result for: env ["-i", "nA=CWz5", "8SvA=cXH"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-vv", "=", "6L3(=7D"] Step #5: === Compare result for: env ["-0", "-vv", "=", "6L3(=7D"] Step #5: Rust stdout: Step #5: nA=CWz58SvA=cXH6L3(=7D Step #5: GNU stdout: Step #5: 6L3(=7D8SvA=cXHLC_ALL=CnA=CWz5= Step #5: --- START diff Step #5: -nA=CWz58SvA=cXH6L3(=7D Step #5: +6L3(=7D8SvA=cXHLC_ALL=CnA=CWz5= Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-vv' Step #5: arg[3]: '=' Step #5: arg[4]: '6L3(=7D' Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: = Step #5: setenv: 6L3(=7D Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: '=' Step #5: -arg[4]: '6L3(=7D' Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: warning: env-warning-no-name-specified Step #5: += Step #5: +setenv: 6L3(=7D Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-vv", "=", "6L3(=7D"] Step #5: Step #5: thread '' (7669) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-vv", "=", "6L3(=7D"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7669== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x37,0x20,0x37,0x37, Step #5: P7 77 Step #5: artifact_prefix='./'; Test unit written to ./crash-ef428f84d0d7c9db8d7c34dec93ac7cac531392c Step #5: Base64: UDcgNzc= Step #5: MERGE-OUTER: attempt 57 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032907354 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ef428f84d0d7c9db8d7c34dec93ac7cac531392c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 129 processed earlier; will process 128 files now Step #5: Running test ["env", "-vv"] Step #5: === Compare result for: env ["-vv"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv"] Step #5: Step #5: thread '' (7762) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7762== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x32,0x31,0x97,0x31, Step #5: P21\2271 Step #5: artifact_prefix='./'; Test unit written to ./crash-ae22cbf4ce90186504c72a71e228b51446ccc2ec Step #5: Base64: UDIxlzE= Step #5: MERGE-OUTER: attempt 58 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032923817 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ae22cbf4ce90186504c72a71e228b51446ccc2ec' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 130 processed earlier; will process 127 files now Step #5: Running test ["env", "-0", "--chdir=/tmp", "ZV(=e7(rQ"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "ZV(=e7(rQ"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "ZV(=e7(rQ"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-0", "--chdir=/tmp", "=X"] Step #5: === Compare result for: env ["-i", "-0", "--chdir=/tmp", "=X"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "--chdir=/tmp", "=X"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (7823) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7823== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x38,0x39,0x34,0x20,0x31, Step #5: 894 1 Step #5: artifact_prefix='./'; Test unit written to ./crash-851fc0a52a73a3f0f8374c9dd9898fe3af35462c Step #5: Base64: ODk0IDE= Step #5: MERGE-OUTER: attempt 59 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032943616 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/851fc0a52a73a3f0f8374c9dd9898fe3af35462c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 133 processed earlier; will process 124 files now Step #5: Running test ["env", "-0", "-u=g⚙"] Step #5: === Compare result for: env ["-0", "-u=g⚙"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=g\342\232\231': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=g\342\232\231': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=g⚙"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "0=rw", "Ã=VÃk"] Step #5: === Compare result for: env ["-v", "0=rw", "Ã=VÃk"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 0=rw Step #5: Ã=VÃk Step #5: Step #5: GNU stdout: Step #5: 0=rw Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Ã=VÃk Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +0=rw Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -0=rw Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Ã=VÃk Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 0=rw Step #5: setenv: Ã=VÃk Step #5: --- START diff Step #5: +0=rw Step #5: +setenv: Ã=VÃk Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "0=rw", "Ã=VÃk"] Step #5: Step #5: thread '' (7897) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "0=rw", "Ã=VÃk"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7897== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7b,0x35,0x2f,0x2d,0x39, Step #5: {5/-9 Step #5: artifact_prefix='./'; Test unit written to ./crash-610b73af522848575e586a3aa3dc350e406500e9 Step #5: Base64: ezUvLTk= Step #5: MERGE-OUTER: attempt 60 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032961311 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/610b73af522848575e586a3aa3dc350e406500e9' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 135 processed earlier; will process 122 files now Step #5: Running test ["env", "-i", "M="] Step #5: === Compare result for: env ["-i", "M="] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-0", "--chdir=/tmp", "⚙🪛q=H", "7=jF"] Step #5: === Compare result for: env ["-i", "-0", "--chdir=/tmp", "⚙🪛q=H", "7=jF"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "--chdir=/tmp", "⚙🪛q=H", "7=jF"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "Z=LfH(", "=u(nER"] Step #5: === Compare result for: env ["-0", "Z=LfH(", "=u(nER"] Step #5: Rust stdout: Step #5: M=Z=LfH( Step #5: GNU stdout: Step #5: LC_ALL=CM=Z=LfH(=u(nER Step #5: --- START diff Step #5: -M=Z=LfH( Step #5: +LC_ALL=CM=Z=LfH(=u(nER Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "Z=LfH(", "=u(nER"] Step #5: Step #5: thread '' (7946) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "Z=LfH(", "=u(nER"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7946== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x38,0x38,0x38,0x20,0x31, Step #5: 888 1 Step #5: artifact_prefix='./'; Test unit written to ./crash-0f2b0c923dfceb0a8bd20a717c3d2bf94e056f1e Step #5: Base64: ODg4IDE= Step #5: MERGE-OUTER: attempt 61 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032980641 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0f2b0c923dfceb0a8bd20a717c3d2bf94e056f1e' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 138 processed earlier; will process 119 files now Step #5: Running test ["env", "-u=g2jSiAy", "--chdir=/tmp"] Step #5: === Compare result for: env ["-u=g2jSiAy", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=g2jSiAy': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=g2jSiAy': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=g2jSiAy", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-v", "-vv", "-u=H🔗rG(I🧰d", "rLÃh=wfe", "cvu=XAP"] Step #5: === Compare result for: env ["-0", "-v", "-vv", "-u=H🔗rG(I🧰d", "rLÃh=wfe", "cvu=XAP"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =H🔗rG(I🧰d Step #5: env: cannot unset '=H\360\237\224\227rG(I\360\237\247\260d': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=H🔗rG(I🧰d Step #5: +env: cannot unset '=H\360\237\224\227rG(I\360\237\247\260d': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-v", "-vv", "-u=H🔗rG(I🧰d", "rLÃh=wfe", "cvu=XAP"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv", "p=9klVx", "T4=S8⚙"] Step #5: === Compare result for: env ["-vv", "p=9klVx", "T4=S8⚙"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: p=9klVx Step #5: T4=S8⚙ Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: T4=S8⚙ Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: p=9klVx Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +T4=S8⚙ Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: p=9klVx Step #5: -T4=S8⚙ Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'p=9klVx' Step #5: arg[3]: 'T4=S8⚙' Step #5: GNU stderr: Step #5: p=9klVx Step #5: setenv: T4=S8⚙ Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'p=9klVx' Step #5: -arg[3]: 'T4=S8⚙' Step #5: +p=9klVx Step #5: +setenv: T4=S8⚙ Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "p=9klVx", "T4=S8⚙"] Step #5: Step #5: thread '' (8001) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "p=9klVx", "T4=S8⚙"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8001== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x83,0xe,0x78,0x8, Step #5: 0\203\016x\010 Step #5: artifact_prefix='./'; Test unit written to ./crash-af2380c992c4543dc0eaf7b11cab13bc8d8484c1 Step #5: Base64: MIMOeAg= Step #5: MERGE-OUTER: attempt 62 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4032999176 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/af2380c992c4543dc0eaf7b11cab13bc8d8484c1' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 141 processed earlier; will process 116 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8076) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8076== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x37,0x6d,0x6d,0x41,0x0, Step #5: P7mmA\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-524f6bb9c5bddfd4fa8e64d06afa3d812ec1c068 Step #5: Base64: UDdtbUEA Step #5: MERGE-OUTER: attempt 63 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033014618 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/524f6bb9c5bddfd4fa8e64d06afa3d812ec1c068' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 142 processed earlier; will process 115 files now Step #5: Running test ["env", "--chdir=/tmp", "b=bF", "(mXO⚙=🔗hM"] Step #5: === Compare result for: env ["--chdir=/tmp", "b=bF", "(mXO⚙=🔗hM"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "b=bF", "(mXO⚙=🔗hM"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "9x=oWIÃ"] Step #5: === Compare result for: env ["9x=oWIÃ"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 9x=oWIà Step #5: Step #5: GNU stdout: Step #5: 9x=oWIà Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +9x=oWIà Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -9x=oWIà Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["9x=oWIÃ"] Step #5: Step #5: thread '' (8115) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["9x=oWIÃ"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8115== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x62,0x65,0x67,0x69,0x6e,0x22, Step #5: begin\" Step #5: artifact_prefix='./'; Test unit written to ./crash-3fb6df596c77cb681c8a7bfeee2cf96132afc23b Step #5: Base64: YmVnaW4i Step #5: MERGE-OUTER: attempt 64 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033032774 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3fb6df596c77cb681c8a7bfeee2cf96132afc23b' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 144 processed earlier; will process 113 files now Step #5: Running test ["env", "-u=1AKnF", "0(ZVe=iu"] Step #5: === Compare result for: env ["-u=1AKnF", "0(ZVe=iu"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=1AKnF': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=1AKnF': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=1AKnF", "0(ZVe=iu"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "--chdir=/tmp", "Ãg4Fz=KI3"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "Ãg4Fz=KI3"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "Ãg4Fz=KI3"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "=NÃk(L", "=ap"] Step #5: === Compare result for: env ["=NÃk(L", "=ap"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =ap Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=ap Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=NÃk(L", "=ap"] Step #5: Step #5: thread '' (8186) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=NÃk(L", "=ap"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8186== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x2,0x0,0x6c,0xfa, Step #5: \000\000\002\000l\372 Step #5: artifact_prefix='./'; Test unit written to ./crash-df41dfb90706ee5b5e63e319f69c9bfd54c7c2f6 Step #5: Base64: AAACAGz6 Step #5: MERGE-OUTER: attempt 65 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033052715 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/df41dfb90706ee5b5e63e319f69c9bfd54c7c2f6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 147 processed earlier; will process 110 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "C⚙L5b=", "Ji=IC\u{fe0f}"] Step #5: === Compare result for: env ["-0", "C⚙L5b=", "Ji=IC\u{fe0f}"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workC⚙L5b=Ji=IC️ Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=C⚙L5b=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverJi=IC️LC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workC⚙L5b=Ji=IC️ Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=C⚙L5b=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverJi=IC️LC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "C⚙L5b=", "Ji=IC\u{fe0f}"] Step #5: Step #5: thread '' (8266) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "C⚙L5b=", "Ji=IC\u{fe0f}"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8266== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xef,0x84,0xff,0xff,0xfd,0xff, Step #5: \357\204\377\377\375\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-6213c239fa77fe740ba2a2c7cca487a1d3a9db59 Step #5: Base64: 74T///3/ Step #5: MERGE-OUTER: attempt 66 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033070468 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/6213c239fa77fe740ba2a2c7cca487a1d3a9db59' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 149 processed earlier; will process 108 files now Step #5: Running test ["env", "-v", "-u=tOj🔩HWu", "U1g6🧰=Y0ÃI🔩"] Step #5: === Compare result for: env ["-v", "-u=tOj🔩HWu", "U1g6🧰=Y0ÃI🔩"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =tOj🔩HWu Step #5: env: cannot unset '=tOj\360\237\224\251HWu': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=tOj🔩HWu Step #5: +env: cannot unset '=tOj\360\237\224\251HWu': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=tOj🔩HWu", "U1g6🧰=Y0ÃI🔩"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0"] Step #5: === Compare result for: env ["-0"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0"] Step #5: Step #5: thread '' (8302) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8302== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x37,0x50,0x23,0x52,0xb, Step #5: P7P#R\013 Step #5: artifact_prefix='./'; Test unit written to ./crash-6228b9e6874d1287bd65e903cd63ad2b3242b5a6 Step #5: Base64: UDdQI1IL Step #5: MERGE-OUTER: attempt 67 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033086789 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/6228b9e6874d1287bd65e903cd63ad2b3242b5a6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 151 processed earlier; will process 106 files now Step #5: Running test ["env", "-v", "-vv"] Step #5: === Compare result for: env ["-v", "-vv"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "-vv"] Step #5: Step #5: thread '' (8353) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8353== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x23,0x40,0x7e,0x5e,0x22,0xff, Step #5: #@~^\"\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-466366c1d1d53d3b4e0ea69c5cbeaabcc68621f3 Step #5: Base64: I0B+XiL/ Step #5: MERGE-OUTER: attempt 68 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033102971 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/466366c1d1d53d3b4e0ea69c5cbeaabcc68621f3' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 152 processed earlier; will process 105 files now Step #5: Running test ["env", "-i", "-vv", "-u=(🪛u("] Step #5: === Compare result for: env ["-i", "-vv", "-u=(🪛u("] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-vv", "-u=(🪛u("] Step #5: Step #5: thread '' (8384) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-vv", "-u=(🪛u("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8384== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0xff,0xdb,0xcc,0xff, Step #5: \000\000\377\333\314\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-2fc95c44437a85d89073a3e81ca8616f4dac2ef6 Step #5: Base64: AAD/28z/ Step #5: MERGE-OUTER: attempt 69 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033116635 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2fc95c44437a85d89073a3e81ca8616f4dac2ef6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 153 processed earlier; will process 104 files now Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (8417) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8417== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xff,0x9f,0xff,0xff,0x1,0x0, Step #5: \377\237\377\377\001\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-574f55a0e56ab8fbdcefcde60660ac58d365a6dd Step #5: Base64: /5///wEA Step #5: MERGE-OUTER: attempt 70 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033132955 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/574f55a0e56ab8fbdcefcde60660ac58d365a6dd' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 154 processed earlier; will process 103 files now Step #5: Running test ["env", "9=UW", "NZ="] Step #5: === Compare result for: env ["9=UW", "NZ="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 9=UW Step #5: NZ= Step #5: Step #5: GNU stdout: Step #5: 9=UW Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: NZ= Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +9=UW Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +NZ= Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -9=UW Step #5: -NZ= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["9=UW", "NZ="] Step #5: Step #5: thread '' (8450) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["9=UW", "NZ="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8450== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6c,0x73,0x68,0x77,0x33,0x22, Step #5: lshw3\" Step #5: artifact_prefix='./'; Test unit written to ./crash-4f3a92f810eb2c26ab1f3dd2bdf86c9b30c1256f Step #5: Base64: bHNodzMi Step #5: MERGE-OUTER: attempt 71 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033149474 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/4f3a92f810eb2c26ab1f3dd2bdf86c9b30c1256f' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 155 processed earlier; will process 102 files now Step #5: Running test ["env", "-i", "E="] Step #5: === Compare result for: env ["-i", "E="] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-vv", "q🪛Od1=AtYuD"] Step #5: === Compare result for: env ["-i", "-vv", "q🪛Od1=AtYuD"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-vv' Step #5: arg[3]: 'q🪛Od1=AtYuD' Step #5: GNU stderr: Step #5: q🪛Od1=AtYuD Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: 'q🪛Od1=AtYuD' Step #5: +q🪛Od1=AtYuD Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv", "q🪛Od1=AtYuD"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=Ã(Ã🔗", "CLQhx=LMÃ9"] Step #5: === Compare result for: env ["-u=Ã(Ã🔗", "CLQhx=LMÃ9"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\303\203(\303\203\360\237\224\227': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\303\203(\303\203\360\237\224\227': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=Ã(Ã🔗", "CLQhx=LMÃ9"] Step #5: Step #5: Running test ["env", "YT=gjZ", "r=🔩"] Step #5: === Compare result for: env ["YT=gjZ", "r=🔩"] Step #5: Rust stdout: Step #5: q🪛Od1=AtYuD Step #5: YT=gjZ Step #5: r=🔩 Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: YT=gjZ Step #5: q🪛Od1=AtYuD Step #5: r=🔩 Step #5: Step #5: --- START diff Step #5: -q🪛Od1=AtYuD Step #5: +LC_ALL=C Step #5: YT=gjZ Step #5: +q🪛Od1=AtYuD Step #5: r=🔩 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["YT=gjZ", "r=🔩"] Step #5: Step #5: thread '' (8469) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["YT=gjZ", "r=🔩"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8469== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x63,0x6d,0x6d,0x70,0x70,0x32,0x4, Step #5: cmmpp2\004 Step #5: artifact_prefix='./'; Test unit written to ./crash-f6b3fdb9384b589c0654e8ae717effa0359b6437 Step #5: Base64: Y21tcHAyBA== Step #5: MERGE-OUTER: attempt 72 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033169309 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f6b3fdb9384b589c0654e8ae717effa0359b6437' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 159 processed earlier; will process 98 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8514) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8514== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x32,0xa,0x36,0x38,0x31,0x31,0x32, Step #5: 2\01268112 Step #5: artifact_prefix='./'; Test unit written to ./crash-81fa7bb9ee2b7e417250123bb68b535bd49ccc23 Step #5: Base64: Mgo2ODExMg== Step #5: MERGE-OUTER: attempt 73 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033185007 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/81fa7bb9ee2b7e417250123bb68b535bd49ccc23' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 160 processed earlier; will process 97 files now Step #5: Running test ["env", "-i", "o=9\u{fe0f}"] Step #5: === Compare result for: env ["-i", "o=9\u{fe0f}"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "(QÃ(0=", "PIkT="] Step #5: === Compare result for: env ["-v", "(QÃ(0=", "PIkT="] Step #5: Rust stdout: Step #5: o=9️ Step #5: (QÃ(0= Step #5: PIkT= Step #5: Step #5: GNU stdout: Step #5: (QÃ(0= Step #5: LC_ALL=C Step #5: PIkT= Step #5: o=9️ Step #5: Step #5: --- START diff Step #5: -o=9️ Step #5: (QÃ(0= Step #5: +LC_ALL=C Step #5: PIkT= Step #5: +o=9️ Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: (QÃ(0= Step #5: setenv: PIkT= Step #5: --- START diff Step #5: +(QÃ(0= Step #5: +setenv: PIkT= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "(QÃ(0=", "PIkT="] Step #5: Step #5: thread '' (8536) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "(QÃ(0=", "PIkT="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8536== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x32,0x35,0x30,0xb,0x32,0x35,0x30, Step #5: 250\013250 Step #5: artifact_prefix='./'; Test unit written to ./crash-a4d02aa6e45b866422f538308fe8813e2b08abf9 Step #5: Base64: MjUwCzI1MA== Step #5: MERGE-OUTER: attempt 74 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033202357 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/a4d02aa6e45b866422f538308fe8813e2b08abf9' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 162 processed earlier; will process 95 files now Step #5: Running test ["env", "-v", "-u=N"] Step #5: === Compare result for: env ["-v", "-u=N"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =N Step #5: env: cannot unset '=N': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=N Step #5: +env: cannot unset '=N': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=N"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "7k=9i"] Step #5: === Compare result for: env ["-v", "7k=9i"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 7k=9i Step #5: Step #5: GNU stdout: Step #5: 7k=9i Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +7k=9i Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -7k=9i Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 7k=9i Step #5: --- START diff Step #5: +7k=9i Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "7k=9i"] Step #5: Step #5: thread '' (8567) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "7k=9i"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8567== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2,0x0,0x0,0x0,0x0,0x1c,0x32,0x80, Step #5: \002\000\000\000\000\0342\200 Step #5: artifact_prefix='./'; Test unit written to ./crash-f06c29f0c814c327d29d741b10967c670a371de7 Step #5: Base64: AgAAAAAcMoA= Step #5: MERGE-OUTER: attempt 75 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033219587 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f06c29f0c814c327d29d741b10967c670a371de7' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 164 processed earlier; will process 93 files now Step #5: Running test ["env", "--chdir=/tmp", "5=sIWJC", "D2N="] Step #5: === Compare result for: env ["--chdir=/tmp", "5=sIWJC", "D2N="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "5=sIWJC", "D2N="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=H", "--chdir=/tmp", "Wj=8u\u{fe0f}"] Step #5: === Compare result for: env ["-u=H", "--chdir=/tmp", "Wj=8u\u{fe0f}"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=H': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=H': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=H", "--chdir=/tmp", "Wj=8u\u{fe0f}"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "C="] Step #5: === Compare result for: env ["C="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: C= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: C= Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: +C= Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -C= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["C="] Step #5: Step #5: thread '' (8600) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["C="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8600== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x31,0x20,0x34,0x20,0x34,0x34,0x20,0x0, Step #5: 1 4 44 \000 Step #5: artifact_prefix='./'; Test unit written to ./crash-94a4b1ce44d4aaf1763406252a386e674eac21ce Step #5: Base64: MSA0IDQ0IAA= Step #5: MERGE-OUTER: attempt 76 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033239345 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/94a4b1ce44d4aaf1763406252a386e674eac21ce' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 167 processed earlier; will process 90 files now Step #5: Running test ["env", "-i", "🧰=eF", "IbWM="] Step #5: === Compare result for: env ["-i", "🧰=eF", "IbWM="] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "p=gÃ"] Step #5: === Compare result for: env ["p=gÃ"] Step #5: Rust stdout: Step #5: 🧰=eF Step #5: IbWM= Step #5: p=gà Step #5: Step #5: GNU stdout: Step #5: IbWM= Step #5: LC_ALL=C Step #5: p=gà Step #5: 🧰=eF Step #5: Step #5: --- START diff Step #5: -🧰=eF Step #5: IbWM= Step #5: +LC_ALL=C Step #5: p=gà Step #5: +🧰=eF Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["p=gÃ"] Step #5: Step #5: thread '' (8633) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["p=gÃ"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8633== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6,0x0,0x0,0x0,0xf2,0x11,0xd,0xc0, Step #5: \006\000\000\000\362\021\015\300 Step #5: artifact_prefix='./'; Test unit written to ./crash-39bb756bfce6d016ff95537dbe830aee54bf0979 Step #5: Base64: BgAAAPIRDcA= Step #5: MERGE-OUTER: attempt 77 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033255586 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/39bb756bfce6d016ff95537dbe830aee54bf0979' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 169 processed earlier; will process 88 files now Step #5: Running test ["env", "-vv", "f8sv=Q"] Step #5: === Compare result for: env ["-vv", "f8sv=Q"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: f8sv=Q Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: f8sv=Q Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: f8sv=Q Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'f8sv=Q' Step #5: GNU stderr: Step #5: f8sv=Q Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'f8sv=Q' Step #5: +f8sv=Q Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "f8sv=Q"] Step #5: Step #5: thread '' (8658) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "f8sv=Q"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8658== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x34,0x38,0x96,0x32,0x50,0x50,0x34, Step #5: P48\2262PP4 Step #5: artifact_prefix='./'; Test unit written to ./crash-1d6a2fae96f79335aa2fb452a856cadd6efc816b Step #5: Base64: UDQ4ljJQUDQ= Step #5: MERGE-OUTER: attempt 78 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033270976 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1d6a2fae96f79335aa2fb452a856cadd6efc816b' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 170 processed earlier; will process 87 files now Step #5: Running test ["env", "-u="] Step #5: === Compare result for: env ["-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-0", "-vv", "-u=Yu"] Step #5: === Compare result for: env ["-i", "-0", "-vv", "-u=Yu"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-0", "-vv", "-u=Yu"] Step #5: Step #5: thread '' (8678) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-0", "-vv", "-u=Yu"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8678== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2,0x0,0x0,0x0,0x2,0x2,0x3,0x80, Step #5: \002\000\000\000\002\002\003\200 Step #5: artifact_prefix='./'; Test unit written to ./crash-70d119bd2695ed51f3780dba11d6564bb1b5b66a Step #5: Base64: AgAAAAICA4A= Step #5: MERGE-OUTER: attempt 79 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033286704 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/70d119bd2695ed51f3780dba11d6564bb1b5b66a' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 172 processed earlier; will process 85 files now Step #5: Running test ["env", "-0", "-vv"] Step #5: === Compare result for: env ["-0", "-vv"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-vv"] Step #5: Step #5: thread '' (8695) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8695== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x36,0x31,0x9,0x31,0x0,0x33,0x31, Step #5: P61\0111\00031 Step #5: artifact_prefix='./'; Test unit written to ./crash-937567957e188f58a37ff90f62c2b715f5d9bddd Step #5: Base64: UDYxCTEAMzE= Step #5: MERGE-OUTER: attempt 80 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033301575 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/937567957e188f58a37ff90f62c2b715f5d9bddd' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 173 processed earlier; will process 84 files now Step #5: Running test ["env", "-0", "-v", "="] Step #5: === Compare result for: env ["-0", "-v", "="] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE= Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE= Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: = Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: += Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "="] Step #5: Step #5: thread '' (8717) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8717== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x0,0x0,0x2,0x0,0x90,0xf6, Step #5: \000\000\000\000\002\000\220\366 Step #5: artifact_prefix='./'; Test unit written to ./crash-b210e2f8830d37e1620f3206006f8124f6e0362e Step #5: Base64: AAAAAAIAkPY= Step #5: MERGE-OUTER: attempt 81 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033317099 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b210e2f8830d37e1620f3206006f8124f6e0362e' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 174 processed earlier; will process 83 files now Step #5: Running test ["env", "-i", "-v", "-vv", "-u=⚙n9q"] Step #5: === Compare result for: env ["-i", "-v", "-vv", "-u=⚙n9q"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-v", "-vv", "-u=⚙n9q"] Step #5: Step #5: thread '' (8741) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-v", "-vv", "-u=⚙n9q"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8741== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2,0x0,0x2,0x0,0x70,0x8,0x0,0x0, Step #5: \002\000\002\000p\010\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-edccd565e99afa4de201d87d3a596d2181ec44b5 Step #5: Base64: AgACAHAIAAA= Step #5: MERGE-OUTER: attempt 82 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033331622 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/edccd565e99afa4de201d87d3a596d2181ec44b5' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 175 processed earlier; will process 82 files now Step #5: Running test ["env", "-u=Q7lOpo", "--chdir=/tmp", "(=m", "W96=8V"] Step #5: === Compare result for: env ["-u=Q7lOpo", "--chdir=/tmp", "(=m", "W96=8V"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=Q7lOpo': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=Q7lOpo': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=Q7lOpo", "--chdir=/tmp", "(=m", "W96=8V"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-u=M", "y=Y"] Step #5: === Compare result for: env ["-0", "-u=M", "y=Y"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=M': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=M': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=M", "y=Y"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: Running test ["env", "r=9("] Step #5: === Compare result for: env ["r=9("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: r=9( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: r=9( Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: r=9( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["r=9("] Step #5: Step #5: thread '' (8774) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["r=9("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8774== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2,0x0,0x0,0x0,0xfd,0x13,0x0,0x0, Step #5: \002\000\000\000\375\023\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-fd7b4ac2012f7e7786c24a9fe513020dcb42905e Step #5: Base64: AgAAAP0TAAA= Step #5: MERGE-OUTER: attempt 83 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033351846 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/fd7b4ac2012f7e7786c24a9fe513020dcb42905e' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 179 processed earlier; will process 78 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8821) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8821== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7a,0x21,0x3d,0x78,0x21,0x3d,0x21,0x3d, Step #5: z!=x!=!= Step #5: artifact_prefix='./'; Test unit written to ./crash-bd0759f00b906809fa2a2671d9c543c77b489b74 Step #5: Base64: eiE9eCE9IT0= Step #5: MERGE-OUTER: attempt 84 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033368975 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/bd0759f00b906809fa2a2671d9c543c77b489b74' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 180 processed earlier; will process 77 files now Step #5: Running test ["env", "-0", "ow="] Step #5: === Compare result for: env ["-0", "ow="] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workow= Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEow= Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workow= Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEow= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "ow="] Step #5: Step #5: thread '' (8845) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "ow="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8845== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x37,0x38,0x36,0x33,0x36,0x34,0x20,0x33, Step #5: 786364 3 Step #5: artifact_prefix='./'; Test unit written to ./crash-1a67b610e59adddaa42d593848bd975b1de7e24a Step #5: Base64: Nzg2MzY0IDM= Step #5: MERGE-OUTER: attempt 85 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033386069 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1a67b610e59adddaa42d593848bd975b1de7e24a' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 181 processed earlier; will process 76 files now Step #5: Running test ["env", "C=g🧰", "hKL=(L4"] Step #5: === Compare result for: env ["C=g🧰", "hKL=(L4"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: C=g🧰 Step #5: hKL=(L4 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: C=g🧰 Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: hKL=(L4 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: +C=g🧰 Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -C=g🧰 Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: hKL=(L4 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["C=g🧰", "hKL=(L4"] Step #5: Step #5: thread '' (8898) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["C=g🧰", "hKL=(L4"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8898== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x38,0x20,0x31,0x30,0x32,0x33,0x33,0x36,0x37, Step #5: 8 1023367 Step #5: artifact_prefix='./'; Test unit written to ./crash-2403a2f55b91aa5e9bce5902c59e53dc46ffd3a6 Step #5: Base64: OCAxMDIzMzY3 Step #5: MERGE-OUTER: attempt 86 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033402664 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2403a2f55b91aa5e9bce5902c59e53dc46ffd3a6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 182 processed earlier; will process 75 files now Step #5: Running test ["env", "-v", "=🧰ujN"] Step #5: === Compare result for: env ["-v", "=🧰ujN"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =🧰ujN Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=🧰ujN Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =🧰ujN Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=🧰ujN Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=🧰ujN"] Step #5: Step #5: thread '' (8910) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=🧰ujN"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8910== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x20,0x31,0x30,0x34,0x38,0x35,0x37,0x34, Step #5: \000 1048574 Step #5: artifact_prefix='./'; Test unit written to ./crash-15a8b8adc3668dcd0004e3653f7b2242409efea6 Step #5: Base64: ACAxMDQ4NTc0 Step #5: MERGE-OUTER: attempt 87 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033418480 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/15a8b8adc3668dcd0004e3653f7b2242409efea6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 183 processed earlier; will process 74 files now Step #5: Running test ["env", "-vv", "bx=OALÃk", "Jv7NG=🔗F(ÃD"] Step #5: === Compare result for: env ["-vv", "bx=OALÃk", "Jv7NG=🔗F(ÃD"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: bx=OALÃk Step #5: Jv7NG=🔗F(ÃD Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: Jv7NG=🔗F(ÃD Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: bx=OALÃk Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +Jv7NG=🔗F(ÃD Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: bx=OALÃk Step #5: -Jv7NG=🔗F(ÃD Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'bx=OALÃk' Step #5: arg[3]: 'Jv7NG=🔗F(ÃD' Step #5: GNU stderr: Step #5: bx=OALÃk Step #5: setenv: Jv7NG=🔗F(ÃD Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'bx=OALÃk' Step #5: -arg[3]: 'Jv7NG=🔗F(ÃD' Step #5: +bx=OALÃk Step #5: +setenv: Jv7NG=🔗F(ÃD Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "bx=OALÃk", "Jv7NG=🔗F(ÃD"] Step #5: Step #5: thread '' (8929) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "bx=OALÃk", "Jv7NG=🔗F(ÃD"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8929== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x31,0x31,0x24,0x33,0x50,0x31,0x33,0x32, Step #5: P11$3P132 Step #5: artifact_prefix='./'; Test unit written to ./crash-9345284c64d0d88a4797d9b106df1239d4258bb4 Step #5: Base64: UDExJDNQMTMy Step #5: MERGE-OUTER: attempt 88 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033433973 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/9345284c64d0d88a4797d9b106df1239d4258bb4' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 184 processed earlier; will process 73 files now Step #5: Running test ["env", "-0", "-v", "cGN=7hq0", "=3"] Step #5: === Compare result for: env ["-0", "-v", "cGN=7hq0", "=3"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workcGN=7hq0 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEcGN=7hq0=3 Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workcGN=7hq0 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEcGN=7hq0=3 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: cGN=7hq0 Step #5: setenv: =3 Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +cGN=7hq0 Step #5: +setenv: =3 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "cGN=7hq0", "=3"] Step #5: Step #5: thread '' (8954) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "cGN=7hq0", "=3"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8954== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x72,0x6f,0x72,0x9,0x72,0x31,0x31,0x64,0x78, Step #5: ror\011r11dx Step #5: artifact_prefix='./'; Test unit written to ./crash-78460244464b37b12862aad03f88ade342cbd549 Step #5: Base64: cm9yCXIxMWR4 Step #5: MERGE-OUTER: attempt 89 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033448674 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/78460244464b37b12862aad03f88ade342cbd549' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 185 processed earlier; will process 72 files now Step #5: Running test ["env", "-0", "lÃaoF=1Wh"] Step #5: === Compare result for: env ["-0", "lÃaoF=1Wh"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/worklÃaoF=1Wh Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCElÃaoF=1Wh Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/worklÃaoF=1Wh Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCElÃaoF=1Wh Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "lÃaoF=1Wh"] Step #5: Step #5: thread '' (8976) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "lÃaoF=1Wh"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8976== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x37,0xa,0x77,0x69,0x64,0x74,0x68,0x8f, Step #5: P7\012width\217 Step #5: artifact_prefix='./'; Test unit written to ./crash-13621f499c27987a3fe8c3911949b4b0879c3373 Step #5: Base64: UDcKd2lkdGiP Step #5: MERGE-OUTER: attempt 90 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033463155 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/13621f499c27987a3fe8c3911949b4b0879c3373' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 186 processed earlier; will process 71 files now Step #5: Running test ["env", "-vv", "-u=(GVku", "--chdir=/tmp"] Step #5: === Compare result for: env ["-vv", "-u=(GVku", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =(GVku Step #5: env: cannot unset '=(GVku': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=(GVku Step #5: +env: cannot unset '=(GVku': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=(GVku", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-v", "I3=vp1", "ZgsbÃ=uDp"] Step #5: === Compare result for: env ["-i", "-v", "I3=vp1", "ZgsbÃ=uDp"] Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: I3=vp1 Step #5: setenv: ZgsbÃ=uDp Step #5: --- START diff Step #5: +I3=vp1 Step #5: +setenv: ZgsbÃ=uDp Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "I3=vp1", "ZgsbÃ=uDp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "=f"] Step #5: === Compare result for: env ["-v", "=f"] Step #5: Rust stdout: Step #5: I3=vp1 Step #5: ZgsbÃ=uDp Step #5: Step #5: GNU stdout: Step #5: I3=vp1 Step #5: LC_ALL=C Step #5: ZgsbÃ=uDp Step #5: =f Step #5: Step #5: --- START diff Step #5: I3=vp1 Step #5: +LC_ALL=C Step #5: ZgsbÃ=uDp Step #5: +=f Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =f Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=f Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=f"] Step #5: Step #5: thread '' (9012) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=f"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9012== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xff,0xfe,0xff,0xff,0xff,0xea,0xff,0xff,0x10, Step #5: \377\376\377\377\377\352\377\377\020 Step #5: artifact_prefix='./'; Test unit written to ./crash-0280f0bcbc6e25937999536304a488c5bb7e3691 Step #5: Base64: //7////q//8Q Step #5: MERGE-OUTER: attempt 91 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033481376 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0280f0bcbc6e25937999536304a488c5bb7e3691' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 189 processed earlier; will process 68 files now Step #5: Running test ["env", "FBf=sX"] Step #5: === Compare result for: env ["FBf=sX"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: FBf=sX Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FBf=sX Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FBf=sX Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -FBf=sX Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["FBf=sX"] Step #5: Step #5: thread '' (9056) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["FBf=sX"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9056== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xff,0x81,0xf3,0xff,0x81,0xf3,0xff,0xff,0xff,0xff, Step #5: \377\201\363\377\201\363\377\377\377\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-bf8df2bbb2d23cd41751786a456bffd79c7548c6 Step #5: Base64: /4Hz/4Hz/////w== Step #5: MERGE-OUTER: attempt 92 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033496845 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/bf8df2bbb2d23cd41751786a456bffd79c7548c6' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 190 processed earlier; will process 67 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-vv"] Step #5: === Compare result for: env ["-vv"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv"] Step #5: Step #5: thread '' (9077) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9077== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0xa,0x2d,0x38,0x33,0x37,0x32,0x32,0x32,0x32, Step #5: 0\012-8372222 Step #5: artifact_prefix='./'; Test unit written to ./crash-ee51cca8bcc1f3df3cc08fbbeeda311dc54a2e43 Step #5: Base64: MAotODM3MjIyMg== Step #5: MERGE-OUTER: attempt 93 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033514570 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ee51cca8bcc1f3df3cc08fbbeeda311dc54a2e43' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 192 processed earlier; will process 65 files now Step #5: Running test ["env", "Ã=Co3V"] Step #5: === Compare result for: env ["Ã=Co3V"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Ã=Co3V Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Ã=Co3V Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Ã=Co3V Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["Ã=Co3V"] Step #5: Step #5: thread '' (9102) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Ã=Co3V"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9102== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x32,0x32,0xf1,0x31,0x3c,0x37,0x0,0x31,0x9e, Step #5: P22\3611<7\0001\236 Step #5: artifact_prefix='./'; Test unit written to ./crash-b7fe54488cc8a8577a87669d5071f7d4c5a38ce2 Step #5: Base64: UDIy8TE8NwAxng== Step #5: MERGE-OUTER: attempt 94 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033531030 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b7fe54488cc8a8577a87669d5071f7d4c5a38ce2' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 193 processed earlier; will process 64 files now Step #5: Running test ["env", "4P=6🔩", "QBÃ=y"] Step #5: === Compare result for: env ["4P=6🔩", "QBÃ=y"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 4P=6🔩 Step #5: QBÃ=y Step #5: Step #5: GNU stdout: Step #5: 4P=6🔩 Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: QBÃ=y Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +4P=6🔩 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +QBÃ=y Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -4P=6🔩 Step #5: -QBÃ=y Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["4P=6🔩", "QBÃ=y"] Step #5: Step #5: thread '' (9123) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["4P=6🔩", "QBÃ=y"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9123== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x35,0x31,0x23,0x32,0x23,0x32,0x2,0x0,0x4, Step #5: P51#2#2\002\000\004 Step #5: artifact_prefix='./'; Test unit written to ./crash-3581570f3ee0a4afea0d86ea186730d123226c86 Step #5: Base64: UDUxIzIjMgIABA== Step #5: MERGE-OUTER: attempt 95 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033547117 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3581570f3ee0a4afea0d86ea186730d123226c86' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 194 processed earlier; will process 63 files now Step #5: Running test ["env", "-i", "-vv"] Step #5: === Compare result for: env ["-i", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "Ma🔗jV=Wyh", "="] Step #5: === Compare result for: env ["-v", "Ma🔗jV=Wyh", "="] Step #5: Rust stdout: Step #5: Ma🔗jV=Wyh Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Ma🔗jV=Wyh Step #5: = Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: Ma🔗jV=Wyh Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: Ma🔗jV=Wyh Step #5: setenv: = Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +Ma🔗jV=Wyh Step #5: +setenv: = Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "Ma🔗jV=Wyh", "="] Step #5: Step #5: thread '' (9135) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "Ma🔗jV=Wyh", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9135== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7d,0x5b,0x34,0x5e,0x28,0x33,0x5e,0x28,0x31,0x31, Step #5: }[4^(3^(11 Step #5: artifact_prefix='./'; Test unit written to ./crash-0ce8da39b707ddc60a96ab758bf77e6bda5fd19e Step #5: Base64: fVs0XigzXigxMQ== Step #5: MERGE-OUTER: attempt 96 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033564818 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0ce8da39b707ddc60a96ab758bf77e6bda5fd19e' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 196 processed earlier; will process 61 files now Step #5: Running test ["env", "--chdir=/tmp", "=Q5"] Step #5: === Compare result for: env ["--chdir=/tmp", "=Q5"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "=Q5"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=(z", "--chdir=/tmp", "=PJS"] Step #5: === Compare result for: env ["-u=(z", "--chdir=/tmp", "=PJS"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=(z': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=(z': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=(z", "--chdir=/tmp", "=PJS"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-u=WzW", "--chdir=/tmp", "D=8B"] Step #5: === Compare result for: env ["-v", "-u=WzW", "--chdir=/tmp", "D=8B"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =WzW Step #5: env: cannot unset '=WzW': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=WzW Step #5: +env: cannot unset '=WzW': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=WzW", "--chdir=/tmp", "D=8B"] Step #5: Step #5: Running test ["env", "-v", "3=eC"] Step #5: === Compare result for: env ["-v", "3=eC"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 3=eC Step #5: Step #5: GNU stdout: Step #5: 3=eC Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +3=eC Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -3=eC Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 3=eC Step #5: --- START diff Step #5: +3=eC Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "3=eC"] Step #5: Step #5: thread '' (9161) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "3=eC"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9161== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x2,0x0,0x4,0x4,0xe,0x0,0x0,0xff,0x28, Step #5: \000\000\002\000\004\004\016\000\000\377( Step #5: artifact_prefix='./'; Test unit written to ./crash-18894d86a02bda9c2fa246877d22120434766104 Step #5: Base64: AAACAAQEDgAA/yg= Step #5: MERGE-OUTER: attempt 97 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033586303 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/18894d86a02bda9c2fa246877d22120434766104' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 200 processed earlier; will process 57 files now Step #5: Running test ["env", "-i", "--chdir=/tmp", "7a=uhLQe"] Step #5: === Compare result for: env ["-i", "--chdir=/tmp", "7a=uhLQe"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "--chdir=/tmp", "7a=uhLQe"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "(UR=pLS9", "tu=(c⚙ca"] Step #5: === Compare result for: env ["(UR=pLS9", "tu=(c⚙ca"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: (UR=pLS9 Step #5: tu=(c⚙ca Step #5: Step #5: GNU stdout: Step #5: (UR=pLS9 Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: tu=(c⚙ca Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(UR=pLS9 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -(UR=pLS9 Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: tu=(c⚙ca Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["(UR=pLS9", "tu=(c⚙ca"] Step #5: Step #5: thread '' (9197) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["(UR=pLS9", "tu=(c⚙ca"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9197== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x36,0x31,0xb3,0x31,0x50,0x39,0x30,0x1f,0x1,0x0,0xfd, Step #5: P61\2631P90\037\001\000\375 Step #5: artifact_prefix='./'; Test unit written to ./crash-8181ef6cd5f2584851f1a477133fbdaee3d4ff41 Step #5: Base64: UDYxszFQOTAfAQD9 Step #5: MERGE-OUTER: attempt 98 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033608615 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/8181ef6cd5f2584851f1a477133fbdaee3d4ff41' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 202 processed earlier; will process 55 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9275) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9275== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xff,0x15,0x30,0xff,0xff,0x8e,0xff,0xff,0xff,0xff,0xff,0xff,0xba, Step #5: \377\0250\377\377\216\377\377\377\377\377\377\272 Step #5: artifact_prefix='./'; Test unit written to ./crash-e85cc8cdf24d17a1609bb9286a8825a87a1edbd1 Step #5: Base64: /xUw//+O////////ug== Step #5: MERGE-OUTER: attempt 99 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033630576 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e85cc8cdf24d17a1609bb9286a8825a87a1edbd1' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 203 processed earlier; will process 54 files now Step #5: Running test ["env", "-0"] Step #5: === Compare result for: env ["-0"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0"] Step #5: Step #5: thread '' (9289) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9289== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa6,0x5c,0x20,0x20,0x6b,0xa,0x7e,0x6b,0x2b,0x1,0x0,0xc,0x0, Step #5: \246\\ k\012~k+\001\000\014\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-f511dbb0ca618ddde6ca3be71afce45a3aba6793 Step #5: Base64: plwgIGsKfmsrAQAMAA== Step #5: MERGE-OUTER: attempt 100 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033646985 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f511dbb0ca618ddde6ca3be71afce45a3aba6793' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 204 processed earlier; will process 53 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9295) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9295== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x2,0x0,0x4,0x4,0xf,0x0,0x0,0x0,0x10,0x1,0x2, Step #5: \000\000\002\000\004\004\017\000\000\000\020\001\002 Step #5: artifact_prefix='./'; Test unit written to ./crash-7705ea523b5bc0abf0dedc6fa5b21bc78cfae45a Step #5: Base64: AAACAAQEDwAAABABAg== Step #5: MERGE-OUTER: attempt 101 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033664051 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7705ea523b5bc0abf0dedc6fa5b21bc78cfae45a' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 205 processed earlier; will process 52 files now Step #5: Running test ["env", "-i", "ÃO=a9\u{fe0f}"] Step #5: === Compare result for: env ["-i", "ÃO=a9\u{fe0f}"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=aET"] Step #5: === Compare result for: env ["-u=aET"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=aET': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=aET': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=aET"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=o"] Step #5: === Compare result for: env ["-u=o"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=o': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=o': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=o"] Step #5: Step #5: Running test ["env", "-0", "-u=h", "🧰=", "SR0⚙=Ã"] Step #5: === Compare result for: env ["-0", "-u=h", "🧰=", "SR0⚙=Ã"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=h': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=h': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=h", "🧰=", "SR0⚙=Ã"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0"] Step #5: === Compare result for: env ["-0"] Step #5: Rust stdout: Step #5: ÃO=a9️ Step #5: GNU stdout: Step #5: LC_ALL=CÃO=a9️ Step #5: --- START diff Step #5: -ÃO=a9️ Step #5: +LC_ALL=CÃO=a9️ Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0"] Step #5: Step #5: thread '' (9303) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9303== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x31,0x38,0x35,0x38,0x39,0x39,0x33,0x32,0x35,0x34,0x33,0x28,0x39, Step #5: P18589932543(9 Step #5: artifact_prefix='./'; Test unit written to ./crash-2e064c8c9631e611014a8580b5dd3b90596c75d5 Step #5: Base64: UDE4NTg5OTMyNTQzKDk= Step #5: MERGE-OUTER: attempt 102 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033687488 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2e064c8c9631e611014a8580b5dd3b90596c75d5' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 210 processed earlier; will process 47 files now Step #5: Running test ["env", "ZeSS=(b", "=tQw"] Step #5: === Compare result for: env ["ZeSS=(b", "=tQw"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: ZeSS=(b Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: ZeSS=(b Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =tQw Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: ZeSS=(b Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=tQw Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["ZeSS=(b", "=tQw"] Step #5: Step #5: thread '' (9324) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["ZeSS=(b", "=tQw"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9324== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x33,0x35,0xff,0x36,0x40,0x31,0x35,0xff,0x30,0x89,0x30,0x83,0x37,0x83, Step #5: P35\3776@15\3770\2110\2037\203 Step #5: artifact_prefix='./'; Test unit written to ./crash-91e4cba953c682f39c6c8e18485858a942f3b331 Step #5: Base64: UDM1/zZAMTX/MIkwgzeD Step #5: MERGE-OUTER: attempt 103 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033703296 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/91e4cba953c682f39c6c8e18485858a942f3b331' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 211 processed earlier; will process 46 files now Step #5: Running test ["env", "-0", "-v", "-u=l⚙"] Step #5: === Compare result for: env ["-0", "-v", "-u=l⚙"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =l⚙ Step #5: env: cannot unset '=l\342\232\231': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=l⚙ Step #5: +env: cannot unset '=l\342\232\231': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-v", "-u=l⚙"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=t", "Mrs🔩t=4Hn"] Step #5: === Compare result for: env ["-u=t", "Mrs🔩t=4Hn"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=t': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=t': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=t", "Mrs🔩t=4Hn"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: Running test ["env", "-0", "\u{fe0f}qhS🧰=🔩e", "wrA=m🔩x"] Step #5: === Compare result for: env ["-0", "\u{fe0f}qhS🧰=🔩e", "wrA=m🔩x"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work️qhS🧰=🔩ewrA=m🔩x Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEwrA=m🔩x️qhS🧰=🔩e Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work️qhS🧰=🔩ewrA=m🔩x Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEwrA=m🔩x️qhS🧰=🔩e Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "\u{fe0f}qhS🧰=🔩e", "wrA=m🔩x"] Step #5: Step #5: thread '' (9330) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "\u{fe0f}qhS🧰=🔩e", "wrA=m🔩x"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9330== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x44,0x4c,0x20,0x6e,0x3d,0x36,0x35,0x35,0x33,0x35,0xa,0x44,0x61,0x74,0x61,0x3a,0x31,0xa, Step #5: DL n=65535\012Data:1\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-eecb31225642cc3b5254009aa7d787468ceb643c Step #5: Base64: REwgbj02NTUzNQpEYXRhOjEK Step #5: MERGE-OUTER: attempt 104 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033722795 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/eecb31225642cc3b5254009aa7d787468ceb643c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 215 processed earlier; will process 42 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9348) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9348== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x2,0x0,0x4,0x4,0xf,0x0,0x97,0xef,0x20,0x3d,0x20,0x20,0x2e,0x24,0xa0,0x31, Step #5: \000\000\002\000\004\004\017\000\227\357 = .$\2401 Step #5: artifact_prefix='./'; Test unit written to ./crash-f912dfe9b041b7901779e511d051f321420a3739 Step #5: Base64: AAACAAQEDwCX7yA9ICAuJKAx Step #5: MERGE-OUTER: attempt 105 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033738391 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f912dfe9b041b7901779e511d051f321420a3739' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 216 processed earlier; will process 41 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9354) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9354== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x2,0x0,0x4,0x4,0xf,0x0,0xe3,0x29,0x31,0x36,0x31,0xa5,0x38,0x32,0x2f,0x35, Step #5: \000\000\002\000\004\004\017\000\343)161\24582/5 Step #5: artifact_prefix='./'; Test unit written to ./crash-5206f4369c576964a0a45cae0dac720e6ce9b27c Step #5: Base64: AAACAAQEDwDjKTE2MaU4Mi81 Step #5: MERGE-OUTER: attempt 106 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033753648 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5206f4369c576964a0a45cae0dac720e6ce9b27c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 217 processed earlier; will process 40 files now Step #5: Running test ["env", "-i", "="] Step #5: === Compare result for: env ["-i", "="] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: = Step #5: Step #5: --- START diff Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "="] Step #5: Step #5: thread '' (9360) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9360== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x31,0x20,0x32,0x20,0x33,0x20,0x34,0xa,0x35,0x20,0x36,0x20,0x37,0x20,0x38,0x20,0x39,0x9,0x0, Step #5: 1 2 3 4\0125 6 7 8 9\011\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-753b6b717fdf4d21d127f50212224fa086034a3b Step #5: Base64: MSAyIDMgNAo1IDYgNyA4IDkJAA== Step #5: MERGE-OUTER: attempt 107 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033768458 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/753b6b717fdf4d21d127f50212224fa086034a3b' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 218 processed earlier; will process 39 files now Step #5: Running test ["env", "-v", "-u=mÃ", "--chdir=/tmp", "aOOZG=ÃIj", "v(PjU=lg3x"] Step #5: === Compare result for: env ["-v", "-u=mÃ", "--chdir=/tmp", "aOOZG=ÃIj", "v(PjU=lg3x"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =mà Step #5: env: cannot unset '=m\303\203': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=mà Step #5: +env: cannot unset '=m\303\203': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=mÃ", "--chdir=/tmp", "aOOZG=ÃIj", "v(PjU=lg3x"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "ÃA=", "EQf=zÃ4"] Step #5: === Compare result for: env ["ÃA=", "EQf=zÃ4"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: ÃA= Step #5: EQf=zÃ4 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: EQf=zÃ4 Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ÃA= Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +EQf=zÃ4 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ÃA= Step #5: -EQf=zÃ4 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["ÃA=", "EQf=zÃ4"] Step #5: Step #5: thread '' (9366) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["ÃA=", "EQf=zÃ4"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9366== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x9,0x0,0x2,0x10,0x4,0x0,0x0,0x9f,0x9e,0xcd,0x2c,0x1b,0x0,0xff,0x40,0xd7,0x7,0x0,0x1,0x16, Step #5: \000\000\011\000\002\020\004\000\000\237\236\315,\033\000\377@\327\007\000\001\026 Step #5: artifact_prefix='./'; Test unit written to ./crash-86b01349ff6ef6a0629f34c8238587be7d8ce127 Step #5: Base64: AAAJAAIQBAAAn57NLBsA/0DXBwABFg== Step #5: MERGE-OUTER: attempt 108 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033786774 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/86b01349ff6ef6a0629f34c8238587be7d8ce127' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 220 processed earlier; will process 37 files now Step #5: Running test ["env", "-i", "-0"] Step #5: === Compare result for: env ["-i", "-0"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9375) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9375== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2d,0x39,0x32,0x32,0x33,0x33,0x36,0x38,0x30,0x33,0x36,0x38,0x30,0x37,0x39,0x36,0x30,0x31,0x32,0x35,0xa,0x0, Step #5: -9223368036807960125\012\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-d1954627268041c32f5e8e437f3b9134b479eead Step #5: Base64: LTkyMjMzNjgwMzY4MDc5NjAxMjUKAA== Step #5: MERGE-OUTER: attempt 109 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033804383 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/d1954627268041c32f5e8e437f3b9134b479eead' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 222 processed earlier; will process 35 files now Step #5: Running test ["env", "Q(=M("] Step #5: === Compare result for: env ["Q(=M("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Q(=M( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: Q(=M( Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +Q(=M( Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -Q(=M( Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["Q(=M("] Step #5: Step #5: thread '' (9384) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Q(=M("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9384== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa,0xa,0x82,0x63,0xe6,0xe6,0xf5,0xa7,0xff,0x32,0x32,0x8f,0x32,0x32,0x32,0x32,0x32,0xff,0xff,0xff,0x52,0x32,0x32,0xa, Step #5: \012\012\202c\346\346\365\247\37722\21722222\377\377\377R22\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-ddbab56a41eced25ed040e8360e6f97ba261d7fa Step #5: Base64: CgqCY+bm9af/MjKPMjIyMjL///9SMjIK Step #5: MERGE-OUTER: attempt 110 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033821140 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ddbab56a41eced25ed040e8360e6f97ba261d7fa' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 223 processed earlier; will process 34 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9391) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9391== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x65,0x3d,0x45,0x3b,0x45,0x3d,0x31,0x3b,0x65,0x3d,0x45,0x3b,0x45,0x3d,0x45,0x3b,0x45,0x3d,0x31,0x3b,0x65,0x3d,0x45,0x3b,0x45, Step #5: e=E;E=1;e=E;E=E;E=1;e=E;E Step #5: artifact_prefix='./'; Test unit written to ./crash-00c07c22af775fb3bd1719550a2c1b9a97b47466 Step #5: Base64: ZT1FO0U9MTtlPUU7RT1FO0U9MTtlPUU7RQ== Step #5: MERGE-OUTER: attempt 111 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033838284 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/00c07c22af775fb3bd1719550a2c1b9a97b47466' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 224 processed earlier; will process 33 files now Step #5: Running test ["env", "-vv", "-u=jEeY", "7pSo=uc3R", "🪛=c🧰(m"] Step #5: === Compare result for: env ["-vv", "-u=jEeY", "7pSo=uc3R", "🪛=c🧰(m"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =jEeY Step #5: env: cannot unset '=jEeY': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=jEeY Step #5: +env: cannot unset '=jEeY': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=jEeY", "7pSo=uc3R", "🪛=c🧰(m"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-vv", "(k=", "r=j6"] Step #5: === Compare result for: env ["-i", "-vv", "(k=", "r=j6"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-vv' Step #5: arg[3]: '(k=' Step #5: arg[4]: 'r=j6' Step #5: GNU stderr: Step #5: (k= Step #5: setenv: r=j6 Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: '(k=' Step #5: -arg[4]: 'r=j6' Step #5: +(k= Step #5: +setenv: r=j6 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv", "(k=", "r=j6"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (k= Step #5: r=j6 Step #5: Step #5: GNU stdout: Step #5: (k= Step #5: LC_ALL=C Step #5: r=j6 Step #5: Step #5: --- START diff Step #5: (k= Step #5: +LC_ALL=C Step #5: r=j6 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9406) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9406== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2e,0x3d,0x2e,0x31,0x38,0x34,0x34,0x36,0x37,0x34,0x34,0x30,0x37,0x33,0x37,0x30,0x39,0x30,0x35,0x31,0x36,0x31,0x31,0x0,0xf6,0x37, Step #5: .=.18446744073709051611\000\3667 Step #5: artifact_prefix='./'; Test unit written to ./crash-073c1cf6b6836848f93540377302028d8af30ba9 Step #5: Base64: Lj0uMTg0NDY3NDQwNzM3MDkwNTE2MTEA9jc= Step #5: MERGE-OUTER: attempt 112 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033857141 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/073c1cf6b6836848f93540377302028d8af30ba9' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 227 processed earlier; will process 30 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "rP=7🧰B"] Step #5: === Compare result for: env ["-i", "rP=7🧰B"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-vv", "-u=4(h"] Step #5: === Compare result for: env ["-vv", "-u=4(h"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =4(h Step #5: env: cannot unset '=4(h': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=4(h Step #5: +env: cannot unset '=4(h': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=4(h"] Step #5: Step #5: Running test ["env", "-i", "-u=", "T=f", "ÃR2nQ=B8"] Step #5: === Compare result for: env ["-i", "-u=", "T=f", "ÃR2nQ=B8"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: T=f Step #5: ÃR2nQ=B8 Step #5: Step #5: --- START diff Step #5: +T=f Step #5: +ÃR2nQ=B8 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=", "T=f", "ÃR2nQ=B8"] Step #5: Step #5: thread '' (9419) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=", "T=f", "ÃR2nQ=B8"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9419== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0xb0,0x0,0x8e,0xb1,0x0,0x7,0x0,0x0,0xff,0xff,0xff,0x60,0x3f,0x9a,0xff,0xff,0x5,0x1,0xff,0x0,0x0,0xd2,0xff,0x0,0xff,0xff,0x0, Step #5: \000\260\000\216\261\000\007\000\000\377\377\377`?\232\377\377\005\001\377\000\000\322\377\000\377\377\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-6ef31abeab0c6db557ecf9d5563a56dceec8506f Step #5: Base64: ALAAjrEABwAA////YD+a//8FAf8AANL/AP//AA== Step #5: MERGE-OUTER: attempt 113 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033877026 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/6ef31abeab0c6db557ecf9d5563a56dceec8506f' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 231 processed earlier; will process 26 files now Step #5: Running test ["env", "-vv", "--chdir=/tmp", "0=DBT", "cb=\u{fe0f}"] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp", "0=DBT", "cb=\u{fe0f}"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: arg[3]: '0=DBT' Step #5: arg[4]: 'cb=️' Step #5: /workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: 0=DBT Step #5: setenv: cb=️ Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -arg[3]: '0=DBT' Step #5: -arg[4]: 'cb=️' Step #5: -/workspace/out/libfuzzer-coverage-x86_64/fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +0=DBT Step #5: +setenv: cb=️ Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp", "0=DBT", "cb=\u{fe0f}"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "Cq=CDY", "7a="] Step #5: === Compare result for: env ["Cq=CDY", "7a="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Cq=CDY Step #5: 7a= Step #5: Step #5: GNU stdout: Step #5: 7a= Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: Cq=CDY Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +7a= Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +Cq=CDY Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -Cq=CDY Step #5: -7a= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["Cq=CDY", "7a="] Step #5: Step #5: thread '' (9434) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Cq=CDY", "7a="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9434== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x34,0x20,0x33,0xa,0x36,0x20,0x0,0xa,0x38,0xa,0x31,0xa,0x36,0xa,0x0,0x20,0x39,0xa,0x35,0x20,0x34,0x20,0x33,0xa,0x38,0xa,0x31,0xa,0x39,0xa,0x35, Step #5: 4 3\0126 \000\0128\0121\0126\012\000 9\0125 4 3\0128\0121\0129\0125 Step #5: artifact_prefix='./'; Test unit written to ./crash-1ad54a1566d7c5b601c4f448e448955ec0d2f0a4 Step #5: Base64: NCAzCjYgAAo4CjEKNgoAIDkKNSA0IDMKOAoxCjkKNQ== Step #5: MERGE-OUTER: attempt 114 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033896878 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1ad54a1566d7c5b601c4f448e448955ec0d2f0a4' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 233 processed earlier; will process 24 files now Step #5: Running test ["env", "-u=fhx", "V2🧰OP="] Step #5: === Compare result for: env ["-u=fhx", "V2🧰OP="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=fhx': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=fhx': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=fhx", "V2🧰OP="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-u=F"] Step #5: === Compare result for: env ["-i", "-u=F"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=F"] Step #5: Step #5: thread '' (9443) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=F"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9443== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x44,0x4c,0x20,0x6e,0x3d,0x34,0xa,0x66,0x6f,0x72,0x6d,0x61,0x74,0x3d,0x65,0x64,0x67,0x65,0x6c,0x69,0x73,0x74,0x31,0x64,0x61,0x74,0x61,0x3a,0x37,0x20,0x2d,0x32,0x30,0x32,0x31,0x20,0x38,0xa, Step #5: DL n=4\012format=edgelist1data:7 -2021 8\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-f859e7780a338ee418057122ee64bca3ea7c5626 Step #5: Base64: REwgbj00CmZvcm1hdD1lZGdlbGlzdDFkYXRhOjcgLTIwMjEgOAo= Step #5: MERGE-OUTER: attempt 115 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033912391 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f859e7780a338ee418057122ee64bca3ea7c5626' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 235 processed earlier; will process 22 files now Step #5: Running test ["env", "-0", "-v"] Step #5: === Compare result for: env ["-0", "-v"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "-v"] Step #5: Step #5: thread '' (9452) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9452== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa6,0x17,0x0,0xfe,0x59,0xe0,0x0,0x0,0x0,0x0,0x0,0x5e,0xa,0x2d,0x2d,0x2d,0x2d,0xd2,0xe1,0xb7,0xb7,0xb7,0xb7,0xb7,0x1,0xfc,0x0,0x0,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xff,0xff,0xff, Step #5: \246\027\000\376Y\340\000\000\000\000\000^\012----\322\341\267\267\267\267\267\001\374\000\000\377\000\000\000\000\000\000\000\000\377\377\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-cea5e336a7c6af46a291bfe896756a83770bfdeb Step #5: Base64: phcA/lngAAAAAABeCi0tLS3S4be3t7e3AfwAAP8AAAAAAAAAAP///w== Step #5: MERGE-OUTER: attempt 116 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033927345 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/cea5e336a7c6af46a291bfe896756a83770bfdeb' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 236 processed earlier; will process 21 files now Step #5: Running test ["env", "-0", "-v", "QZ🪓=T"] Step #5: === Compare result for: env ["-0", "-v", "QZ🪓=T"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workQZ🪓=T Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64QZ🪓=TRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workQZ🪓=T Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64QZ🪓=TRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: QZ🪓=T Step #5: --- START diff Step #5: +QZ🪓=T Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "QZ🪓=T"] Step #5: Step #5: thread '' (9458) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "QZ🪓=T"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9458== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0xd,0x0,0x2,0x10,0x4,0x0,0x77,0xd5,0xd2,0xf4,0x3a,0xd3,0x1f,0x7a,0x20,0x16,0x0,0x0,0x0,0x16,0x0,0xf3,0x7e,0x7,0x36,0x35,0x35,0x33,0x35,0xa0,0xa0,0xa0,0x65,0xa0,0xa0,0xa0,0xa0,0xa0,0xa0,0xa0,0xa0,0xa0,0x38,0x0, Step #5: \000\000\015\000\002\020\004\000w\325\322\364:\323\037z \026\000\000\000\026\000\363~\00765535\240\240\240e\240\240\240\240\240\240\240\240\2408\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-805b6fa96b96efb56805b8c75ef3005e22715508 Step #5: Base64: AAANAAIQBAB31dL0OtMfeiAWAAAAFgDzfgc2NTUzNaCgoGWgoKCgoKCgoKA4AA== Step #5: MERGE-OUTER: attempt 117 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033942565 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/805b6fa96b96efb56805b8c75ef3005e22715508' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 237 processed earlier; will process 20 files now Step #5: Running test ["env", "-v", "-u=", "2(E=", "wk🔩=2U"] Step #5: === Compare result for: env ["-v", "-u=", "2(E=", "wk🔩=2U"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=", "2(E=", "wk🔩=2U"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-v"] Step #5: === Compare result for: env ["-0", "-v"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "-v"] Step #5: Step #5: thread '' (9464) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9464== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x35,0x39,0x10,0x31,0xd1,0x39,0x31,0x31,0x31,0x31,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0x3b,0x25,0xf1,0xf0,0xda,0xd5,0xde,0x5e,0x64,0x65,0x70,0x74,0x68,0xc4,0x32,0xe0,0x6d,0x61,0x78,0x76,0xf,0xf,0xf,0xf,0xf,0xf,0xf,0x34, Step #5: P59\0201\32191111\377\000\000\000\000\000\000\000\014;%\361\360\332\325\336^depth\3042\340maxv\017\017\017\017\017\017\0174 Step #5: artifact_prefix='./'; Test unit written to ./crash-dbef6e6fac27dc8a219e7f000c5435cac1e70d44 Step #5: Base64: UDU5EDHROTExMTH/AAAAAAAAAAw7JfHw2tXeXmRlcHRoxDLgbWF4dg8PDw8PDw80 Step #5: MERGE-OUTER: attempt 118 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033960655 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/dbef6e6fac27dc8a219e7f000c5435cac1e70d44' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 239 processed earlier; will process 18 files now Step #5: Running test ["env", "-u=\u{fe0f}r15"] Step #5: === Compare result for: env ["-u=\u{fe0f}r15"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\357\270\217r15': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\357\270\217r15': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=\u{fe0f}r15"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-u=7v", "N325=FwoCu"] Step #5: === Compare result for: env ["-i", "-u=7v", "N325=FwoCu"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: N325=FwoCu Step #5: Step #5: --- START diff Step #5: +N325=FwoCu Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=7v", "N325=FwoCu"] Step #5: Step #5: thread '' (9473) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=7v", "N325=FwoCu"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9473== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x20,0x2e,0x62,0x61,0x6c,0x69,0x67,0x6e,0x4c,0x2d,0x35,0x2c,0x35,0x2c,0x35,0x3b,0x20,0x2e,0x62,0x61,0x6c,0x69,0x67,0x6e,0x4c,0x2d,0x30,0x2c,0x2c,0x35,0x35,0x3b,0x20,0x2e,0x62,0x61,0x6c,0x69,0x67,0x6e,0x4c,0x2d,0x30,0x2c,0x2c,0x35,0x35,0x3b,0x20,0x2e,0x62,0x61,0x6c,0x69,0x67,0x6e,0x4c,0x2d,0x35,0x2c,0x35,0x2c,0x35,0x3b, Step #5: .balignL-5,5,5; .balignL-0,,55; .balignL-0,,55; .balignL-5,5,5; Step #5: artifact_prefix='./'; Test unit written to ./crash-896db4043bf8cd8d625e362612ea5f2499b6d790 Step #5: Base64: IC5iYWxpZ25MLTUsNSw1OyAuYmFsaWduTC0wLCw1NTsgLmJhbGlnbkwtMCwsNTU7IC5iYWxpZ25MLTUsNSw1Ow== Step #5: MERGE-OUTER: attempt 119 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033977083 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/896db4043bf8cd8d625e362612ea5f2499b6d790' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 241 processed earlier; will process 16 files now Step #5: Running test ["env", "🪛⚙=LG", "JDÃ(w=jY"] Step #5: === Compare result for: env ["🪛⚙=LG", "JDÃ(w=jY"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 🪛⚙=LG Step #5: JDÃ(w=jY Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JDÃ(w=jY Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🪛⚙=LG Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JDÃ(w=jY Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🪛⚙=LG Step #5: -JDÃ(w=jY Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["🪛⚙=LG", "JDÃ(w=jY"] Step #5: Step #5: thread '' (9482) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["🪛⚙=LG", "JDÃ(w=jY"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9482== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x41,0x2,0x1,0x0,0x30,0x10,0x6,0x7,0x2a,0x86,0x48,0xce,0x3d,0x2,0x1,0x6,0x5,0x2b,0x81,0x4,0x0,0x21,0x4,0x2a,0x30,0x28,0x2,0x1,0x1,0x4,0x1,0x3d,0xa1,0x20,0x3,0x1e,0x0,0x3,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf8,0xf6,0xf8,0xf8,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x54,0x84,0x0,0x1,0x0,0x0,0x0,0x0,0x0, Step #5: 0A\002\001\0000\020\006\007*\206H\316=\002\001\006\005+\201\004\000!\004*0(\002\001\001\004\001=\241 \003\036\000\003\000\000\000\000\000\000\000\000\370\366\370\370\000\000\000\000\000\000\000T\204\000\001\000\000\000\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-fa6814d70cdd10ea7bc7284bb6be19e100bdb581 Step #5: Base64: MEECAQAwEAYHKoZIzj0CAQYFK4EEACEEKjAoAgEBBAE9oSADHgADAAAAAAAAAAD49vj4AAAAAAAAAFSEAAEAAAAAAA== Step #5: MERGE-OUTER: attempt 120 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4033992783 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/fa6814d70cdd10ea7bc7284bb6be19e100bdb581' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 242 processed earlier; will process 15 files now Step #5: Running test ["env", "-0", "-v"] Step #5: === Compare result for: env ["-0", "-v"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "-v"] Step #5: Step #5: thread '' (9488) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9488== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x31,0x31,0xa,0x39,0x39,0x29,0x31,0x33,0x32,0x32,0x32,0x32,0x32,0x32,0x32,0x32,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x37,0x30,0x30,0x30,0x30,0x32,0x37,0x38, Step #5: P11\01299)1322222222777777777777777777777777777777777777777777777770000278 Step #5: artifact_prefix='./'; Test unit written to ./crash-872fd3c907adea23869a0206f04eb57b274182a2 Step #5: Base64: UDExCjk5KTEzMjIyMjIyMjI3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3NzAwMDAyNzg= Step #5: MERGE-OUTER: attempt 121 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034008354 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/872fd3c907adea23869a0206f04eb57b274182a2' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 243 processed earlier; will process 14 files now Step #5: Running test ["env", "9nÃc=A", "p🔩h🔗="] Step #5: === Compare result for: env ["9nÃc=A", "p🔩h🔗="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 9nÃc=A Step #5: p🔩h🔗= Step #5: Step #5: GNU stdout: Step #5: 9nÃc=A Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: p🔩h🔗= Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +9nÃc=A Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -9nÃc=A Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: p🔩h🔗= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["9nÃc=A", "p🔩h🔗="] Step #5: Step #5: thread '' (9494) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["9nÃc=A", "p🔩h🔗="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9494== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x7,0x0,0x2,0x10,0x4,0x0,0x12,0x10,0x2f,0x9,0x0,0x0,0x0,0x9,0x0,0x0,0x0,0x19,0x0,0x1e,0x0,0x0,0x0,0x0,0xc9,0x0,0x0,0x0,0x0,0x59,0x3f,0x80,0x7,0xff,0xff,0x1,0x0,0xe0,0xb9,0x84,0x0,0x16,0x0,0x0,0x12,0x10,0x2f,0x9,0x0,0x0,0x0,0x9,0x0,0x0,0x0,0x19,0x0,0x1e,0x59,0x3f,0x80,0x7,0x5d,0x3b,0x0,0x4b,0x61,0x69,0x2d,0x53,0x42,0x7,0x0,0x7,0x0,0x7,0x7,0x0,0xff,0x36,0x3, Step #5: \000\000\007\000\002\020\004\000\022\020/\011\000\000\000\011\000\000\000\031\000\036\000\000\000\000\311\000\000\000\000Y?\200\007\377\377\001\000\340\271\204\000\026\000\000\022\020/\011\000\000\000\011\000\000\000\031\000\036Y?\200\007];\000Kai-SB\007\000\007\000\007\007\000\3776\003 Step #5: artifact_prefix='./'; Test unit written to ./crash-405b2794c83a6f928c8effb77449996cb36ea488 Step #5: Base64: AAAHAAIQBAASEC8JAAAACQAAABkAHgAAAADJAAAAAFk/gAf//wEA4LmEABYAABIQLwkAAAAJAAAAGQAeWT+AB107AEthaS1TQgcABwAHBwD/NgM= Step #5: MERGE-OUTER: attempt 122 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034025402 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/405b2794c83a6f928c8effb77449996cb36ea488' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 244 processed earlier; will process 13 files now Step #5: Running test ["env", "-0", "sDJd(=OLBC", "bEÃkO=🪓\u{fe0f}Uy0"] Step #5: === Compare result for: env ["-0", "sDJd(=OLBC", "bEÃkO=🪓\u{fe0f}Uy0"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/worksDJd(=OLBCbEÃkO=🪓️Uy0 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEbEÃkO=🪓️Uy0sDJd(=OLBC Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=524027fd213fCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/worksDJd(=OLBCbEÃkO=🪓️Uy0 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=524027fd213fHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEbEÃkO=🪓️Uy0sDJd(=OLBC Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "sDJd(=OLBC", "bEÃkO=🪓\u{fe0f}Uy0"] Step #5: Step #5: thread '' (9500) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "sDJd(=OLBC", "bEÃkO=🪓\u{fe0f}Uy0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9500== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x12,0xf9,0xb9,0xff,0xf3,0xbf,0x96,0xd0,0x0,0xff,0xff,0xff,0x0,0x2,0xa,0x2d,0x2d,0x2d,0x2d,0x2d,0x42,0x45,0x47,0x49,0x4e,0x20,0x2d,0x42,0x45,0x47,0x49,0x4e,0x20,0x7a,0x7a,0x7a,0x7a,0x7a,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x9,0xa,0x2d,0x2d,0x2d,0x2d,0x2d,0x45,0x4e,0x44,0x20,0x2d,0x42,0x45,0x47,0x49,0x4e,0x20,0x7a,0x7a,0x7a,0x7a,0x2e,0x7a,0x2d,0x7a,0x7a,0xff,0xff,0x76,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x1,0x8, Step #5: 0\022\371\271\377\363\277\226\320\000\377\377\377\000\002\012-----BEGIN -BEGIN zzzzz------\011\012-----END -BEGIN zzzz.z-zz\377\377v\000\000\000\000\000\000\000\000\001\010 Step #5: artifact_prefix='./'; Test unit written to ./crash-463c168d5cc4d1c9f8d4c67c74342522e4951bf0 Step #5: Base64: MBL5uf/zv5bQAP///wACCi0tLS0tQkVHSU4gLUJFR0lOIHp6enp6LS0tLS0tCQotLS0tLUVORCAtQkVHSU4genp6ei56LXp6//92AAAAAAAAAAABCA== Step #5: MERGE-OUTER: attempt 123 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034041711 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/463c168d5cc4d1c9f8d4c67c74342522e4951bf0' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 245 processed earlier; will process 12 files now Step #5: Running test ["env", "🪓BF=2v0W"] Step #5: === Compare result for: env ["🪓BF=2v0W"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 🪓BF=2v0W Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🪓BF=2v0W Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🪓BF=2v0W Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["🪓BF=2v0W"] Step #5: Step #5: thread '' (9506) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["🪓BF=2v0W"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9506== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa6,0xa,0x2d,0xa,0x40,0xa,0x2d,0x2d,0xe4,0xaa,0x30,0x3d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x42,0x45,0x47,0x49,0x4e,0x20,0x7a,0x7a,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x9,0xa,0x2d,0x2d,0x2d,0x2d,0x2d,0x45,0x4e,0x44,0x20,0x7a,0x7a,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x97,0x2d,0x2d,0x2d,0x2d,0x2d,0x2d,0x45,0x4e,0x44,0x20,0x7a, Step #5: \246\012-\012@\012--\344\2520=------BEGIN zz---------------------\011\012-----END zz-------------\227\227\227\227\227\227\227\227\227\227\227\227\227\227------END z Step #5: artifact_prefix='./'; Test unit written to ./crash-03366089c9d1b7362834cf4cf884a42d21612991 Step #5: Base64: pgotCkAKLS3kqjA9LS0tLS0tQkVHSU4genotLS0tLS0tLS0tLS0tLS0tLS0tLS0JCi0tLS0tRU5EIHp6LS0tLS0tLS0tLS0tLZeXl5eXl5eXl5eXl5eXLS0tLS0tRU5EIHo= Step #5: MERGE-OUTER: attempt 124 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034059673 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/03366089c9d1b7362834cf4cf884a42d21612991' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 246 processed earlier; will process 11 files now Step #5: Running test ["env", "-i", "-u=BTf", "(=tP4", "a0R=🪛XovT"] Step #5: === Compare result for: env ["-i", "-u=BTf", "(=tP4", "a0R=🪛XovT"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: (=tP4 Step #5: a0R=🪛XovT Step #5: Step #5: --- START diff Step #5: +(=tP4 Step #5: +a0R=🪛XovT Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=BTf", "(=tP4", "a0R=🪛XovT"] Step #5: Step #5: thread '' (9512) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=BTf", "(=tP4", "a0R=🪛XovT"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9512== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50,0x33,0x39,0x2c,0x32,0x23,0x39,0x2c,0x31,0x9,0x33,0xb,0x31,0xc8,0x34,0x24,0x33,0x2f,0x33,0x24,0x31,0x2f,0x32,0x23,0x39,0x2c,0x32,0x9,0x31,0xb,0x30,0xc8,0x30,0x24,0x33,0x2f,0x33,0x24,0x31,0x2f,0x32,0x24,0x31,0x7f,0x31,0x3d,0x30,0x50,0x31,0x7f,0x31,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x33,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x31,0x3d,0x33,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x3d,0x32,0x24, Step #5: P39,2#9,1\0113\0131\3104$3/3$1/2#9,2\0111\0130\3100$3/3$1/2$1\1771=0P1\1771=2=2=2=2=3=2=2=2=2=2=2=1=3=2=2=2=2=2=2=2=2=2=2=2$ Step #5: artifact_prefix='./'; Test unit written to ./crash-b80ae116aa75bf1d4605c29332dc21208db69904 Step #5: Base64: UDM5LDIjOSwxCTMLMcg0JDMvMyQxLzIjOSwyCTELMMgwJDMvMyQxLzIkMX8xPTBQMX8xPTI9Mj0yPTI9Mz0yPTI9Mj0yPTI9Mj0xPTM9Mj0yPTI9Mj0yPTI9Mj0yPTI9Mj0yJA== Step #5: MERGE-OUTER: attempt 125 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034077080 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b80ae116aa75bf1d4605c29332dc21208db69904' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 247 processed earlier; will process 10 files now Step #5: Running test ["env", "-u=cBF"] Step #5: === Compare result for: env ["-u=cBF"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=cBF': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=cBF': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=cBF"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=YZLs", "pÃÃ=82"] Step #5: === Compare result for: env ["-u=YZLs", "pÃÃ=82"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=YZLs': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=YZLs': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=YZLs", "pÃÃ=82"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-v"] Step #5: === Compare result for: env ["-i", "-v"] Step #5: === OK Same behavior Step #5: Step #5: Running test ["env", "v=QH", "h=IDOH⚙"] Step #5: === Compare result for: env ["v=QH", "h=IDOH⚙"] Step #5: Rust stdout: Step #5: v=QH Step #5: h=IDOH⚙ Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: h=IDOH⚙ Step #5: v=QH Step #5: Step #5: --- START diff Step #5: -v=QH Step #5: +LC_ALL=C Step #5: h=IDOH⚙ Step #5: +v=QH Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["v=QH", "h=IDOH⚙"] Step #5: Step #5: thread '' (9534) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["v=QH", "h=IDOH⚙"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9534== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-0b0963249992e4b1faef206af7cb1c10aceb789c Step #5: MERGE-OUTER: attempt 126 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034099076 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0b0963249992e4b1faef206af7cb1c10aceb789c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 251 processed earlier; will process 6 files now Step #5: Running test ["env", "ÃtWz=V", "b4R🪓U=hK"] Step #5: === Compare result for: env ["ÃtWz=V", "b4R🪓U=hK"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: ÃtWz=V Step #5: b4R🪓U=hK Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: b4R🪓U=hK Step #5: ÃtWz=V Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -ÃtWz=V Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: b4R🪓U=hK Step #5: +ÃtWz=V Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["ÃtWz=V", "b4R🪓U=hK"] Step #5: Step #5: thread '' (9565) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["ÃtWz=V", "b4R🪓U=hK"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9565== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-0499a01808372fd2b39381c3c6cd91638d516c0c Step #5: MERGE-OUTER: attempt 127 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034115967 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0499a01808372fd2b39381c3c6cd91638d516c0c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 252 processed earlier; will process 5 files now Step #5: Running test ["env", "-v", "-vv", "(=I"] Step #5: === Compare result for: env ["-v", "-vv", "(=I"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: (=I Step #5: Step #5: GNU stdout: Step #5: (=I Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(=I Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -(=I Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: arg[3]: '(=I' Step #5: GNU stderr: Step #5: (=I Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: '(=I' Step #5: +(=I Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "-vv", "(=I"] Step #5: Step #5: thread '' (9571) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "-vv", "(=I"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9571== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-5cc2df6fb31d2db2f3b27b68692ab2a8511903bb Step #5: MERGE-OUTER: attempt 128 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034133605 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5cc2df6fb31d2db2f3b27b68692ab2a8511903bb' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 253 processed earlier; will process 4 files now Step #5: Running test ["env", "-vv", "(m4W=Z"] Step #5: === Compare result for: env ["-vv", "(m4W=Z"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=524027fd213f Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: (m4W=Z Step #5: Step #5: GNU stdout: Step #5: (m4W=Z Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=524027fd213f Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=524027fd213f Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(m4W=Z Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=524027fd213f Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/5959aceb-e01a-4f84-b0f6-8cc414e8cb38 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -(m4W=Z Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '(m4W=Z' Step #5: GNU stderr: Step #5: (m4W=Z Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '(m4W=Z' Step #5: +(m4W=Z Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "(m4W=Z"] Step #5: Step #5: thread '' (9577) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "(m4W=Z"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9577== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-dd43b767629d6fdb560c0cd19d9147c34ef2fc0c Step #5: MERGE-OUTER: attempt 129 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 4034149542 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1175.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/dd43b767629d6fdb560c0cd19d9147c34ef2fc0c' caused a failure at the previous merge step Step #5: MERGE-INNER: 257 total files; 254 processed earlier; will process 3 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=2S3"] Step #5: === Compare result for: env ["-u=2S3"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=2S3': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=2S3': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=2S3"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-v", "-u=ÃQv", "--chdir=/tmp", "F=A", "L⚙w4(=s5Ck"] Step #5: === Compare result for: env ["-0", "-v", "-u=ÃQv", "--chdir=/tmp", "F=A", "L⚙w4(=s5Ck"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =ÃQv Step #5: env: cannot unset '=\303\203Qv': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=ÃQv Step #5: +env: cannot unset '=\303\203Qv': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-v", "-u=ÃQv", "--chdir=/tmp", "F=A", "L⚙w4(=s5Ck"] Step #5: Step #5: #3 DONE exec/s: 0 rss: 29Mb Step #5: MERGE-OUTER: successful in 129 attempt(s) Step #5: MERGE-OUTER: the control file has 20322 bytes Step #5: MERGE-OUTER: consumed 0Mb (26Mb rss) to parse the control file Step #5: MERGE-OUTER: 0 new files with 0 new features added; 0 new coverage edges Step #5: [2025-10-03 06:09:06,913 INFO] Finding shared libraries for targets (if any). Step #5: [2025-10-03 06:09:06,923 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_env_error.log Step #5: Running fuzz_non_utf8_paths Step #5: Running fuzz_tr Step #5: Running fuzz_parse_time Step #5: Running fuzz_wc Step #5: [2025-10-03 06:09:08,744 INFO] Finding shared libraries for targets (if any). Step #5: Running fuzz_date Step #5: [2025-10-03 06:09:08,753 INFO] Finished finding shared libraries for targets. Step #5: Running fuzz_expr Step #5: Running fuzz_test Step #5: [2025-09-30 08:00:00,002 INFO] Finding shared libraries for targets (if any). Step #5: [2025-09-30 08:00:00,012 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_parse_size_error.log Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_non_utf8_paths_error.log Step #5: [2025-01-05 00:28:00,038 INFO] Finding shared libraries for targets (if any). Step #5: [2025-01-05 00:28:00,048 INFO] Finished finding shared libraries for targets. Step #5: [2025-01-05 00:28:00,057 INFO] Finding shared libraries for targets (if any). Step #5: [2025-01-05 00:28:00,067 INFO] Finished finding shared libraries for targets. Step #5: warning: fuzz_expr: profile data may be out of date - object is newer Step #5: warning: fuzz_test: profile data may be out of date - object is newer Step #5: [1970-05-08 04:00:00,024 INFO] Finding shared libraries for targets (if any).