starting build "ee93f34b-59b1-40b4-bea5-791b7ef65795" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9" Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Sending build context to Docker daemon 5.632kB Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder:ubuntu-24-04 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ubuntu-24-04: Pulling from oss-fuzz-base/base-builder Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 76249c7cd503: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6f31e6def6: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": a2b582eae4ea: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 7028eb4e2dcf: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": d72364a63d2c: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 433c5b64328b: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0cd001567fe3: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5400a81ed02a: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dc4dad7851b1: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 74981dba003a: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6fa4bd51f9: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 9415c194fc97: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bbdf00a02de8: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dbfa123ad3e7: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1012b804b4e1: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 791f7502e992: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 976e217d2a3f: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 13736b10fcff: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f8560f828f5b: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 665d30606078: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": beea73e48ff0: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5400a81ed02a: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8a5dab8fbd81: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8d19d6533203: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3533b6430091: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": caec01f4a9dd: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bd2b2c05639b: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ce578df7167f: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dc4dad7851b1: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": b83b7501bcbc: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 52c92ad2c63a: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 74981dba003a: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 11543bd66340: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0cd001567fe3: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 03ebe7af6406: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f2dd995edee2: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0de6749e96dc: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 57eb6b40c436: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 59c6ea3e00b3: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3940beee3bea: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1137e9ba5e5f: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f4443c76981e: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5a417a17e48b: Pulling fs layer Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6fa4bd51f9: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 665d30606078: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ce578df7167f: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 52c92ad2c63a: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 11543bd66340: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8d19d6533203: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 9415c194fc97: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bbdf00a02de8: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5a417a17e48b: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dbfa123ad3e7: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 13736b10fcff: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": beea73e48ff0: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3940beee3bea: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8a5dab8fbd81: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0de6749e96dc: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f2dd995edee2: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 57eb6b40c436: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f8560f828f5b: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1137e9ba5e5f: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f4443c76981e: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 59c6ea3e00b3: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": b83b7501bcbc: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 976e217d2a3f: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3533b6430091: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1012b804b4e1: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bd2b2c05639b: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 791f7502e992: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": caec01f4a9dd: Waiting Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": d72364a63d2c: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": a2b582eae4ea: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": a2b582eae4ea: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 433c5b64328b: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 433c5b64328b: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dc4dad7851b1: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5400a81ed02a: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5400a81ed02a: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 76249c7cd503: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 76249c7cd503: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 7028eb4e2dcf: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 7028eb4e2dcf: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 9415c194fc97: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 9415c194fc97: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bbdf00a02de8: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bbdf00a02de8: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dbfa123ad3e7: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dbfa123ad3e7: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1012b804b4e1: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1012b804b4e1: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 791f7502e992: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 791f7502e992: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 976e217d2a3f: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6f31e6def6: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6f31e6def6: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f8560f828f5b: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f8560f828f5b: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 13736b10fcff: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6fa4bd51f9: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6fa4bd51f9: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 665d30606078: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 665d30606078: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": beea73e48ff0: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": beea73e48ff0: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8a5dab8fbd81: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8a5dab8fbd81: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8d19d6533203: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8d19d6533203: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bd2b2c05639b: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bd2b2c05639b: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": caec01f4a9dd: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": caec01f4a9dd: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ce578df7167f: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ce578df7167f: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3533b6430091: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3533b6430091: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 52c92ad2c63a: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 52c92ad2c63a: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 11543bd66340: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 11543bd66340: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 76249c7cd503: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": b83b7501bcbc: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f2dd995edee2: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 03ebe7af6406: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 03ebe7af6406: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3940beee3bea: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3940beee3bea: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1137e9ba5e5f: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f4443c76981e: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f4443c76981e: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 57eb6b40c436: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 57eb6b40c436: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0de6749e96dc: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0de6749e96dc: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5a417a17e48b: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5a417a17e48b: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 74981dba003a: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 74981dba003a: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0cd001567fe3: Verifying Checksum Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0cd001567fe3: Download complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6f31e6def6: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": a2b582eae4ea: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 7028eb4e2dcf: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": d72364a63d2c: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 433c5b64328b: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0cd001567fe3: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5400a81ed02a: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dc4dad7851b1: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 74981dba003a: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 2e6fa4bd51f9: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 9415c194fc97: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bbdf00a02de8: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": dbfa123ad3e7: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1012b804b4e1: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 791f7502e992: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 976e217d2a3f: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 13736b10fcff: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f8560f828f5b: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 665d30606078: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": beea73e48ff0: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8a5dab8fbd81: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 8d19d6533203: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3533b6430091: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": caec01f4a9dd: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": bd2b2c05639b: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ce578df7167f: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": b83b7501bcbc: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 52c92ad2c63a: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 11543bd66340: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 03ebe7af6406: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f2dd995edee2: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 0de6749e96dc: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 57eb6b40c436: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 59c6ea3e00b3: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 3940beee3bea: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 1137e9ba5e5f: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": f4443c76981e: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": 5a417a17e48b: Pull complete Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Digest: sha256:b9374baa6a83dec18cb59054b30b74905217cd90c76e6ab1a4c9a7ad31cf1c7a Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:ubuntu-24-04 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ---> 027733fee121 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Step 2/4 : RUN git clone https://github.com/jonathanmetzman/cifuzz-example.git --depth 1 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ---> Running in 518bf31b0307 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Cloning into 'cifuzz-example'... Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Removing intermediate container 518bf31b0307 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ---> e8b93191b897 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Step 3/4 : WORKDIR cifuzz-example Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ---> Running in e6108f2ffbc4 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Removing intermediate container e6108f2ffbc4 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ---> 5d4ccd6327b6 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Step 4/4 : COPY build.sh $SRC/ Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": ---> 08400b021335 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Successfully built 08400b021335 Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Successfully tagged gcr.io/oss-fuzz/cifuzz-example:latest Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/cifuzz-example:latest Finished Step #1 - "build-b0279d11-cef0-44aa-8211-8c0d2a9f69b9" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/cifuzz-example Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + SRCMAP=/tmp/fileD49blY Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cifuzz-example/.git Step #2 - "srcmap": + GIT_DIR=/src/cifuzz-example Step #2 - "srcmap": + cd /src/cifuzz-example Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/jonathanmetzman/cifuzz-example.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=1ea7cd119ff310cf601420cdb4ceadd03c7d4065 Step #2 - "srcmap": + jq_inplace /tmp/fileD49blY '."/src/cifuzz-example" = { type: "git", url: "https://github.com/jonathanmetzman/cifuzz-example.git", rev: "1ea7cd119ff310cf601420cdb4ceadd03c7d4065" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + F=/tmp/fileuxrNj8 Step #2 - "srcmap": + cat /tmp/fileD49blY Step #2 - "srcmap": + jq '."/src/cifuzz-example" = { type: "git", url: "https://github.com/jonathanmetzman/cifuzz-example.git", rev: "1ea7cd119ff310cf601420cdb4ceadd03c7d4065" }' Step #2 - "srcmap": + mv /tmp/fileuxrNj8 /tmp/fileD49blY Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileD49blY Step #2 - "srcmap": + rm /tmp/fileD49blY Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cifuzz-example": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/jonathanmetzman/cifuzz-example.git", Step #2 - "srcmap": "rev": "1ea7cd119ff310cf601420cdb4ceadd03c7d4065" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-afl-address-x86_64" Step #3 - "compile-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-afl-address-x86_64": Copying precompiled AFL++ Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": AFL++ target compilation setup: Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #3 - "compile-afl-address-x86_64": AFL_QUIET=1 Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": done. Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": CC=/src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": CXX=/src/aflplusplus/afl-clang-fast++ Step #3 - "compile-afl-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope Step #3 - "compile-afl-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ Step #3 - "compile-afl-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": + make clean Step #3 - "compile-afl-address-x86_64": rm -fv *.a *.o *unittest *_fuzzer *_seed_corpus.zip crash-* *.zip Step #3 - "compile-afl-address-x86_64": ++ nproc Step #3 - "compile-afl-address-x86_64": + make -j32 all Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ -std=c++11 my_api.cpp -c Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ -std=c++11 -c -o standalone_fuzz_target_runner.o standalone_fuzz_target_runner.cpp Step #3 - "compile-afl-address-x86_64": ar ruv my_api.a my_api.o Step #3 - "compile-afl-address-x86_64": ar: `u' modifier ignored since `D' is the default (see `U') Step #3 - "compile-afl-address-x86_64": ar: creating my_api.a Step #3 - "compile-afl-address-x86_64": a - my_api.o Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ -std=c++11 do_stuff_unittest.cpp my_api.a -o do_stuff_unittest Step #3 - "compile-afl-address-x86_64": /src/aflplusplus/afl-clang-fast++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ -std=c++11 do_stuff_fuzzer.cpp my_api.a /usr/lib/libFuzzingEngine.a -o do_stuff_fuzzer Step #3 - "compile-afl-address-x86_64": do_stuff_fuzzer.cpp:18:1: warning: non-void function does not return a value in all control paths [-Wreturn-type] Step #3 - "compile-afl-address-x86_64": 18 | } Step #3 - "compile-afl-address-x86_64": | ^ Step #3 - "compile-afl-address-x86_64": 1 warning generated. Step #3 - "compile-afl-address-x86_64": zip -q -r do_stuff_fuzzer_seed_corpus.zip do_stuff_test_data Step #3 - "compile-afl-address-x86_64": + find . -name '*_fuzzer' -exec cp -v '{}' /workspace/out/afl-address-x86_64 ';' Step #3 - "compile-afl-address-x86_64": './do_stuff_fuzzer' -> '/workspace/out/afl-address-x86_64/do_stuff_fuzzer' Step #3 - "compile-afl-address-x86_64": + find . -name '*_fuzzer.dict' -exec cp -v '{}' /workspace/out/afl-address-x86_64 ';' Step #3 - "compile-afl-address-x86_64": './do_stuff_fuzzer.dict' -> '/workspace/out/afl-address-x86_64/do_stuff_fuzzer.dict' Step #3 - "compile-afl-address-x86_64": + find . -name '*_fuzzer.options' -exec cp -v '{}' /workspace/out/afl-address-x86_64 ';' Step #3 - "compile-afl-address-x86_64": + find . -name '*_fuzzer_seed_corpus.zip' -exec cp -v '{}' /workspace/out/afl-address-x86_64 ';' Step #3 - "compile-afl-address-x86_64": './do_stuff_fuzzer_seed_corpus.zip' -> '/workspace/out/afl-address-x86_64/do_stuff_fuzzer_seed_corpus.zip' Finished Step #3 - "compile-afl-address-x86_64" Starting Step #4 - "build-check-afl-address-x86_64" Step #4 - "build-check-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-afl-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04' locally Step #4 - "build-check-afl-address-x86_64": ubuntu-24-04: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-afl-address-x86_64": 76249c7cd503: Already exists Step #4 - "build-check-afl-address-x86_64": 2e6f31e6def6: Already exists Step #4 - "build-check-afl-address-x86_64": a2b582eae4ea: Already exists Step #4 - "build-check-afl-address-x86_64": b7b1ddd3f71a: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 2f364faa7f4e: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 8c557032b4bd: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": dd3eaa7967f9: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 41d4e8e61eb4: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": dc2a533a73a6: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": eae6f7408e92: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 78ddb15730f0: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 8b68a38b3419: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": ebaa4bfc6675: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": ccb535e2aa4b: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": aa54c54ac092: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": eff346a16803: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 0d16c817421f: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": ea996eb1b927: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 2aaf7982a1de: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 4409786150f8: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": ea5eb927e900: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 78ddb15730f0: Waiting Step #4 - "build-check-afl-address-x86_64": 8b68a38b3419: Waiting Step #4 - "build-check-afl-address-x86_64": cbc7fe6dfb6c: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": ebaa4bfc6675: Waiting Step #4 - "build-check-afl-address-x86_64": eff346a16803: Waiting Step #4 - "build-check-afl-address-x86_64": 65abf2f5069a: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": ccb535e2aa4b: Waiting Step #4 - "build-check-afl-address-x86_64": 0d16c817421f: Waiting Step #4 - "build-check-afl-address-x86_64": fd7d779a89a3: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": aa54c54ac092: Waiting Step #4 - "build-check-afl-address-x86_64": 051ffcbd7a8d: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": aa113770f1c5: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 2aaf7982a1de: Waiting Step #4 - "build-check-afl-address-x86_64": c661988ba1db: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": ea996eb1b927: Waiting Step #4 - "build-check-afl-address-x86_64": 4ae5c2251568: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 4409786150f8: Waiting Step #4 - "build-check-afl-address-x86_64": eae6f7408e92: Waiting Step #4 - "build-check-afl-address-x86_64": ea5eb927e900: Waiting Step #4 - "build-check-afl-address-x86_64": aa113770f1c5: Waiting Step #4 - "build-check-afl-address-x86_64": c661988ba1db: Waiting Step #4 - "build-check-afl-address-x86_64": 4ae5c2251568: Waiting Step #4 - "build-check-afl-address-x86_64": 051ffcbd7a8d: Waiting Step #4 - "build-check-afl-address-x86_64": fd7d779a89a3: Waiting Step #4 - "build-check-afl-address-x86_64": cbc7fe6dfb6c: Waiting Step #4 - "build-check-afl-address-x86_64": 65abf2f5069a: Waiting Step #4 - "build-check-afl-address-x86_64": 41d4e8e61eb4: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 41d4e8e61eb4: Download complete Step #4 - "build-check-afl-address-x86_64": 8c557032b4bd: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 8c557032b4bd: Download complete Step #4 - "build-check-afl-address-x86_64": b7b1ddd3f71a: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": b7b1ddd3f71a: Download complete Step #4 - "build-check-afl-address-x86_64": 2f364faa7f4e: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 2f364faa7f4e: Download complete Step #4 - "build-check-afl-address-x86_64": eae6f7408e92: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": eae6f7408e92: Download complete Step #4 - "build-check-afl-address-x86_64": dd3eaa7967f9: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": dd3eaa7967f9: Download complete Step #4 - "build-check-afl-address-x86_64": 8b68a38b3419: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 8b68a38b3419: Download complete Step #4 - "build-check-afl-address-x86_64": 78ddb15730f0: Download complete Step #4 - "build-check-afl-address-x86_64": b7b1ddd3f71a: Pull complete Step #4 - "build-check-afl-address-x86_64": aa54c54ac092: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": aa54c54ac092: Download complete Step #4 - "build-check-afl-address-x86_64": ea996eb1b927: Download complete Step #4 - "build-check-afl-address-x86_64": ccb535e2aa4b: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": ccb535e2aa4b: Download complete Step #4 - "build-check-afl-address-x86_64": dc2a533a73a6: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": dc2a533a73a6: Download complete Step #4 - "build-check-afl-address-x86_64": 2f364faa7f4e: Pull complete Step #4 - "build-check-afl-address-x86_64": 4409786150f8: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 4409786150f8: Download complete Step #4 - "build-check-afl-address-x86_64": ea5eb927e900: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": ea5eb927e900: Download complete Step #4 - "build-check-afl-address-x86_64": 8c557032b4bd: Pull complete Step #4 - "build-check-afl-address-x86_64": ebaa4bfc6675: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": ebaa4bfc6675: Download complete Step #4 - "build-check-afl-address-x86_64": fd7d779a89a3: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": fd7d779a89a3: Download complete Step #4 - "build-check-afl-address-x86_64": 65abf2f5069a: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 65abf2f5069a: Download complete Step #4 - "build-check-afl-address-x86_64": aa113770f1c5: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": aa113770f1c5: Download complete Step #4 - "build-check-afl-address-x86_64": dd3eaa7967f9: Pull complete Step #4 - "build-check-afl-address-x86_64": 051ffcbd7a8d: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 051ffcbd7a8d: Download complete Step #4 - "build-check-afl-address-x86_64": 4ae5c2251568: Download complete Step #4 - "build-check-afl-address-x86_64": 41d4e8e61eb4: Pull complete Step #4 - "build-check-afl-address-x86_64": 0d16c817421f: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 0d16c817421f: Download complete Step #4 - "build-check-afl-address-x86_64": c661988ba1db: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": c661988ba1db: Download complete Step #4 - "build-check-afl-address-x86_64": cbc7fe6dfb6c: Download complete Step #4 - "build-check-afl-address-x86_64": 2aaf7982a1de: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 2aaf7982a1de: Download complete Step #4 - "build-check-afl-address-x86_64": dc2a533a73a6: Pull complete Step #4 - "build-check-afl-address-x86_64": eae6f7408e92: Pull complete Step #4 - "build-check-afl-address-x86_64": 78ddb15730f0: Pull complete Step #4 - "build-check-afl-address-x86_64": 8b68a38b3419: Pull complete Step #4 - "build-check-afl-address-x86_64": ebaa4bfc6675: Pull complete Step #4 - "build-check-afl-address-x86_64": ccb535e2aa4b: Pull complete Step #4 - "build-check-afl-address-x86_64": aa54c54ac092: Pull complete Step #4 - "build-check-afl-address-x86_64": eff346a16803: Pull complete Step #4 - "build-check-afl-address-x86_64": 0d16c817421f: Pull complete Step #4 - "build-check-afl-address-x86_64": ea996eb1b927: Pull complete Step #4 - "build-check-afl-address-x86_64": 2aaf7982a1de: Pull complete Step #4 - "build-check-afl-address-x86_64": 4409786150f8: Pull complete Step #4 - "build-check-afl-address-x86_64": ea5eb927e900: Pull complete Step #4 - "build-check-afl-address-x86_64": cbc7fe6dfb6c: Pull complete Step #4 - "build-check-afl-address-x86_64": 65abf2f5069a: Pull complete Step #4 - "build-check-afl-address-x86_64": fd7d779a89a3: Pull complete Step #4 - "build-check-afl-address-x86_64": 051ffcbd7a8d: Pull complete Step #4 - "build-check-afl-address-x86_64": aa113770f1c5: Pull complete Step #4 - "build-check-afl-address-x86_64": c661988ba1db: Pull complete Step #4 - "build-check-afl-address-x86_64": 4ae5c2251568: Pull complete Step #4 - "build-check-afl-address-x86_64": Digest: sha256:e5f37faf560fa998e959cfd8c5d0553442e0f218e81ed51cd02f253c840e6d69 Step #4 - "build-check-afl-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer Step #4 - "build-check-afl-address-x86_64": Retrying failed fuzz targets sequentially 1 Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer Step #4 - "build-check-afl-address-x86_64": Broken fuzz targets 1 Step #4 - "build-check-afl-address-x86_64": ('/tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer'], returncode=1, stdout=b'BAD BUILD: fuzzing /tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer with afl-fuzz failed.\nvm.mmap_rnd_bits = 28\nafl++ setup:\nAFL_SKIP_CPUFREQ=1\nAFL_I_DONT_CARE_ABOUT_MISSING_CRASHES=1\nAFL_TRY_AFFINITY=1\nAFL_IGNORE_UNKNOWN_ENVS=1\nAFL_FUZZER_ARGS=-m none -t 5000+\nAFL_CMPLOG_ONLY_NEW=1\nAFL_FAST_CAL=1\nAFL_NO_UI=1\nAFL_IGNORE_PROBLEMS=1\nAFL_FORKSRV_INIT_TMOUT=30000\nAFL_IGNORE_UNKNOWN_ENVS=1\nAFL_QUIET=1\nAFL_IGNORE_PROBLEMS=1\n/tmp/not-out/tmpuaeyzfsh/afl-fuzz -m none -t 5000+ -i /tmp/do_stuff_fuzzer_corpus -o /tmp/do_stuff_fuzzer_afl_address_out -x do_stuff_fuzzer.dict -- /tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_SKIP_CPUFREQ with value 1\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES with value 1\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_TRY_AFFINITY with value 1\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_CMPLOG_ONLY_NEW with value 1\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_FAST_CAL with value 1\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_NO_UI with value 1\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_IGNORE_PROBLEMS with value 1\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable AFL_FORKSRV_INIT_TMOUT with value 30000\x1b[0m\n\x1b[0;36mafl-fuzz++4.34a\x1b[0m based on afl by Michal Zalewski and a large online community\n\x1b[1;92m[+] \x1b[0mAFL++ is maintained by Marc "van Hauser" Heuse, Dominik Maier, Andrea Fioraldi and Heiko "hexcoder" Ei\xc3\x9ffeldt\x1b[0m\n\x1b[1;92m[+] \x1b[0mAFL++ is open source, get it at https://github.com/AFLplusplus/AFLplusplus\x1b[0m\n\x1b[1;92m[+] \x1b[0mNOTE: AFL++ >= v3 has changed defaults and behaviours - see README.md\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable ASAN_OPTIONS with value alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3:abort_on_error=1:symbolize=0:detect_odr_violation=0:\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled environment variable MSAN_OPTIONS with value print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3:exit_code=86:symbolize=0\x1b[0m\n\x1b[1;92m[+] \x1b[0mNo -M/-S set, autoconfiguring for "-S default"\x1b[0m\n\x1b[1;94m[*] \x1b[0mGetting to work...\x1b[0m\n\x1b[1;92m[+] \x1b[0mUsing exploration-based constant power schedule (EXPLORE)\x1b[0m\n\x1b[1;92m[+] \x1b[0mEnabled testcache with 50 MB\x1b[0m\n\x1b[1;92m[+] \x1b[0mGenerating fuzz data with a length of min=1 max=1048576\x1b[0m\n\x1b[1;94m[*] \x1b[0mChecking core_pattern...\x1b[0m\n\x1b[1;92m[+] \x1b[0mDisabling the UI because AFL_NO_UI is set.\x1b[0m\n\x1b[1;92m[+] \x1b[0mYou have 32 CPU cores and 1 runnable tasks (utilization: 3%).\x1b[0m\n\x1b[1;92m[+] \x1b[0mTry parallel jobs - see docs/fuzzing_in_depth.md#c-using-multiple-cores\x1b[0m\n\x1b[1;94m[*] \x1b[0mSetting up output directories...\x1b[0m\n\x1b[1;94m[*] \x1b[0mChecking CPU core loadout...\x1b[0m\n\x1b[1;92m[+] \x1b[0mFound a free CPU core, try binding to #0.\x1b[0m\n\x1b[1;94m[*] \x1b[0mValidating target binary...\x1b[0m\n\x1b[1;92m[+] \x1b[0m\x1b[1;95mPersistent mode binary detected.\x1b[0m\n\x1b[1;92m[+] \x1b[0m\x1b[1;95mDeferred forkserver binary detected.\x1b[0m\n\x1b[1;94m[*] \x1b[0mScanning \'/tmp/do_stuff_fuzzer_corpus\'...\x1b[0m\n\x1b[1;94m[*] \x1b[0mCreating hard links for all input files...\x1b[0m\n\x1b[1;92m[+] \x1b[0mLoaded a total of 1 seeds.\x1b[0m\n\x1b[1;94m[*] \x1b[0mSpinning up the fork server...\x1b[0m\n\x1b[1;92m[+] \x1b[0mAll right - new fork server model v1 is up.\x1b[0m\n\x1b[1;94m[*] \x1b[0mTarget map size: 99\x1b[0m\n\x1b[1;94m[*] \x1b[0mUsing SHARED MEMORY FUZZING feature.\x1b[0m\n\x1b[1;94m[*] \x1b[0mNo auto-generated dictionary tokens to reuse.\x1b[0m\n\x1b[1;94m[*] \x1b[0mLoading extra dictionary from \'do_stuff_fuzzer.dict\' (level 0)...\x1b[0m\n\x1b[1;94m[*] \x1b[0mLoaded 3 extra tokens, size range 3 B to 4 B.\x1b[0m\n\x1b[1;92m[+] \x1b[0mLoaded a total of 3 extras.\x1b[0m\n\x1b[1;94m[*] \x1b[0mAttempting dry run with \'id:000000,time:0,execs:0,orig:input\'...\x1b[0m\n\n\x1b[1;91m[-] \x1b[0mOops, the program crashed with one of the test cases provided. There are\n several possible explanations:\n\n - The test case causes known crashes under normal working conditions. If\n so, please remove it. The fuzzer should be seeded with interesting\n inputs - but not ones that cause an outright crash.\n\n - In QEMU persistent mode the selected address(es) for the loop are not\n properly cleaning up variables and memory. Try adding\n AFL_QEMU_PERSISTENT_GPR=1 or select better addresses in the binary.\n\n - Least likely, there is a horrible bug in the fuzzer. If other options\n fail, poke the Awesome Fuzzing Discord for troubleshooting tips.\n\x1b[1;93m[!] \x1b[1;97mWARNING: \x1b[0mTest case \'id:000000,time:0,execs:0,orig:input\' results in a crash, skipping\x1b[0m\n\x1b[1;92m[+] \x1b[0mAll test cases processed.\x1b[0m\n\x1b[?25h\x1b[0m\x1b[1;91m\n[-] PROGRAM ABORT : \x1b[0mWe need at least one valid input seed that does not crash!\x1b[1;91m\n Location : \x1b[0mmain(), src/afl-fuzz.c:2943\n\n', stderr=b'')) Step #4 - "build-check-afl-address-x86_64": BAD BUILD: fuzzing /tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer with afl-fuzz failed. Step #4 - "build-check-afl-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "build-check-afl-address-x86_64": afl++ setup: Step #4 - "build-check-afl-address-x86_64": AFL_SKIP_CPUFREQ=1 Step #4 - "build-check-afl-address-x86_64": AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES=1 Step #4 - "build-check-afl-address-x86_64": AFL_TRY_AFFINITY=1 Step #4 - "build-check-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #4 - "build-check-afl-address-x86_64": AFL_FUZZER_ARGS=-m none -t 5000+ Step #4 - "build-check-afl-address-x86_64": AFL_CMPLOG_ONLY_NEW=1 Step #4 - "build-check-afl-address-x86_64": AFL_FAST_CAL=1 Step #4 - "build-check-afl-address-x86_64": AFL_NO_UI=1 Step #4 - "build-check-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #4 - "build-check-afl-address-x86_64": AFL_FORKSRV_INIT_TMOUT=30000 Step #4 - "build-check-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #4 - "build-check-afl-address-x86_64": AFL_QUIET=1 Step #4 - "build-check-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #4 - "build-check-afl-address-x86_64": /tmp/not-out/tmpuaeyzfsh/afl-fuzz -m none -t 5000+ -i /tmp/do_stuff_fuzzer_corpus -o /tmp/do_stuff_fuzzer_afl_address_out -x do_stuff_fuzzer.dict -- /tmp/not-out/tmpuaeyzfsh/do_stuff_fuzzer Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_SKIP_CPUFREQ with value 1 Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES with value 1 Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_TRY_AFFINITY with value 1 Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_CMPLOG_ONLY_NEW with value 1 Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_FAST_CAL with value 1 Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_NO_UI with value 1 Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_IGNORE_PROBLEMS with value 1 Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable AFL_FORKSRV_INIT_TMOUT with value 30000 Step #4 - "build-check-afl-address-x86_64": afl-fuzz++4.34a based on afl by Michal Zalewski and a large online community Step #4 - "build-check-afl-address-x86_64": [+] AFL++ is maintained by Marc "van Hauser" Heuse, Dominik Maier, Andrea Fioraldi and Heiko "hexcoder" Eißfeldt Step #4 - "build-check-afl-address-x86_64": [+] AFL++ is open source, get it at https://github.com/AFLplusplus/AFLplusplus Step #4 - "build-check-afl-address-x86_64": [+] NOTE: AFL++ >= v3 has changed defaults and behaviours - see README.md Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable ASAN_OPTIONS with value alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3:abort_on_error=1:symbolize=0:detect_odr_violation=0: Step #4 - "build-check-afl-address-x86_64": [+] Enabled environment variable MSAN_OPTIONS with value print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3:exit_code=86:symbolize=0 Step #4 - "build-check-afl-address-x86_64": [+] No -M/-S set, autoconfiguring for "-S default" Step #4 - "build-check-afl-address-x86_64": [*] Getting to work... Step #4 - "build-check-afl-address-x86_64": [+] Using exploration-based constant power schedule (EXPLORE) Step #4 - "build-check-afl-address-x86_64": [+] Enabled testcache with 50 MB Step #4 - "build-check-afl-address-x86_64": [+] Generating fuzz data with a length of min=1 max=1048576 Step #4 - "build-check-afl-address-x86_64": [*] Checking core_pattern... Step #4 - "build-check-afl-address-x86_64": [+] Disabling the UI because AFL_NO_UI is set. Step #4 - "build-check-afl-address-x86_64": [+] You have 32 CPU cores and 1 runnable tasks (utilization: 3%). Step #4 - "build-check-afl-address-x86_64": [+] Try parallel jobs - see docs/fuzzing_in_depth.md#c-using-multiple-cores Step #4 - "build-check-afl-address-x86_64": [*] Setting up output directories... Step #4 - "build-check-afl-address-x86_64": [*] Checking CPU core loadout... Step #4 - "build-check-afl-address-x86_64": [+] Found a free CPU core, try binding to #0. Step #4 - "build-check-afl-address-x86_64": [*] Validating target binary... Step #4 - "build-check-afl-address-x86_64": [+] Persistent mode binary detected. Step #4 - "build-check-afl-address-x86_64": [+] Deferred forkserver binary detected. Step #4 - "build-check-afl-address-x86_64": [*] Scanning '/tmp/do_stuff_fuzzer_corpus'... Step #4 - "build-check-afl-address-x86_64": [*] Creating hard links for all input files... Step #4 - "build-check-afl-address-x86_64": [+] Loaded a total of 1 seeds. Step #4 - "build-check-afl-address-x86_64": [*] Spinning up the fork server... Step #4 - "build-check-afl-address-x86_64": [+] All right - new fork server model v1 is up. Step #4 - "build-check-afl-address-x86_64": [*] Target map size: 99 Step #4 - "build-check-afl-address-x86_64": [*] Using SHARED MEMORY FUZZING feature. Step #4 - "build-check-afl-address-x86_64": [*] No auto-generated dictionary tokens to reuse. Step #4 - "build-check-afl-address-x86_64": [*] Loading extra dictionary from 'do_stuff_fuzzer.dict' (level 0)... Step #4 - "build-check-afl-address-x86_64": [*] Loaded 3 extra tokens, size range 3 B to 4 B. Step #4 - "build-check-afl-address-x86_64": [+] Loaded a total of 3 extras. Step #4 - "build-check-afl-address-x86_64": [*] Attempting dry run with 'id:000000,time:0,execs:0,orig:input'... Step #4 - "build-check-afl-address-x86_64": Step #4 - "build-check-afl-address-x86_64": [-] Oops, the program crashed with one of the test cases provided. There are Step #4 - "build-check-afl-address-x86_64": several possible explanations: Step #4 - "build-check-afl-address-x86_64": Step #4 - "build-check-afl-address-x86_64": - The test case causes known crashes under normal working conditions. If Step #4 - "build-check-afl-address-x86_64": so, please remove it. The fuzzer should be seeded with interesting Step #4 - "build-check-afl-address-x86_64": inputs - but not ones that cause an outright crash. Step #4 - "build-check-afl-address-x86_64": Step #4 - "build-check-afl-address-x86_64": - In QEMU persistent mode the selected address(es) for the loop are not Step #4 - "build-check-afl-address-x86_64": properly cleaning up variables and memory. Try adding Step #4 - "build-check-afl-address-x86_64": AFL_QEMU_PERSISTENT_GPR=1 or select better addresses in the binary. Step #4 - "build-check-afl-address-x86_64": Step #4 - "build-check-afl-address-x86_64": - Least likely, there is a horrible bug in the fuzzer. If other options Step #4 - "build-check-afl-address-x86_64": fail, poke the Awesome Fuzzing Discord for troubleshooting tips. Step #4 - "build-check-afl-address-x86_64": [!] WARNING: Test case 'id:000000,time:0,execs:0,orig:input' results in a crash, skipping Step #4 - "build-check-afl-address-x86_64": [+] All test cases processed. Step #4 - "build-check-afl-address-x86_64": [?25h Step #4 - "build-check-afl-address-x86_64": [-] PROGRAM ABORT : We need at least one valid input seed that does not crash! Step #4 - "build-check-afl-address-x86_64": Location : main(), src/afl-fuzz.c:2943 Step #4 - "build-check-afl-address-x86_64": Step #4 - "build-check-afl-address-x86_64": Step #4 - "build-check-afl-address-x86_64": ERROR: 100.0% of fuzz targets seem to be broken. See the list above for a detailed information. Step #4 - "build-check-afl-address-x86_64": Build check automatically passing because of ignored targets. Finished Step #4 - "build-check-afl-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/cifuzz-example Step #6: adding: SanitizerCoverageLTO.so (deflated 70%) Step #6: adding: SanitizerCoveragePCGUARD.so (deflated 70%) Step #6: adding: afl-addseeds (deflated 57%) Step #6: adding: afl-analyze (deflated 55%) Step #6: adding: afl-c++ (deflated 57%) Step #6: adding: afl-c++.8 (deflated 55%) Step #6: adding: afl-cc (deflated 57%) Step #6: adding: afl-cc.8 (deflated 55%) Step #6: adding: afl-clang (deflated 57%) Step #6: adding: afl-clang++ (deflated 57%) Step #6: adding: afl-clang-fast (deflated 57%) Step #6: adding: afl-clang-fast++ (deflated 57%) Step #6: adding: afl-clang-fast++.8 (deflated 55%) Step #6: adding: afl-clang-fast.8 (deflated 55%) Step #6: adding: afl-clang-lto (deflated 57%) Step #6: adding: afl-clang-lto++ (deflated 57%) Step #6: adding: afl-clang-lto++.8 (deflated 55%) Step #6: adding: afl-clang-lto.8 (deflated 55%) Step #6: adding: afl-cmin (deflated 70%) Step #6: adding: afl-cmin.bash (deflated 65%) Step #6: adding: afl-cmin.py (deflated 71%) Step #6: adding: afl-compiler-rt-32.o (deflated 54%) Step #6: adding: afl-compiler-rt-64.o (deflated 67%) Step #6: adding: afl-compiler-rt.o (deflated 67%) Step #6: adding: afl-fuzz (deflated 55%) Step #6: adding: afl-g++ (deflated 57%) Step #6: adding: afl-gcc (deflated 57%) Step #6: adding: afl-gotcpu (deflated 62%) Step #6: adding: afl-ld-lto (deflated 62%) Step #6: adding: afl-llvm-dict2file.so (deflated 70%) Step #6: adding: afl-llvm-lto-instrumentlist.so (deflated 71%) Step #6: adding: afl-llvm-pass.so (deflated 69%) Step #6: adding: afl-llvm-rt-lto-32.o (deflated 20%) Step #6: adding: afl-llvm-rt-lto-64.o (deflated 20%) Step #6: adding: afl-llvm-rt-lto.o (deflated 20%) Step #6: adding: afl-lto (deflated 57%) Step #6: adding: afl-lto++ (deflated 57%) Step #6: adding: afl-lto++.8 (deflated 55%) Step #6: adding: afl-lto.8 (deflated 55%) Step #6: adding: afl-persistent-config (deflated 59%) Step #6: adding: afl-plot (deflated 65%) Step #6: adding: afl-showmap (deflated 55%) Step #6: adding: afl-system-config (deflated 63%) Step #6: adding: afl-tmin (deflated 55%) Step #6: adding: afl-whatsup (deflated 69%) Step #6: adding: afl-wine-trace (deflated 70%) Step #6: adding: afl_options.txt (deflated 20%) Step #6: adding: cmplog-instructions-pass.so (deflated 71%) Step #6: adding: cmplog-routines-pass.so (deflated 70%) Step #6: adding: cmplog-switches-pass.so (deflated 70%) Step #6: adding: compare-transform-pass.so (deflated 69%) Step #6: adding: do_stuff_fuzzer (deflated 66%) Step #6: adding: do_stuff_fuzzer.dict (deflated 22%) Step #6: adding: do_stuff_fuzzer_seed_corpus.zip (stored 0%) Step #6: adding: dynamic_list.txt (deflated 76%) Step #6: adding: injection-pass.so (deflated 70%) Step #6: adding: libAFLDriver.a (deflated 64%) Step #6: adding: libAFLQemuDriver.a (deflated 65%) Step #6: adding: llvm-symbolizer (deflated 65%) Step #6: adding: split-compares-pass.so (deflated 69%) Step #6: adding: split-switches-pass.so (deflated 70%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 89257482f398: Waiting Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 176 0 0 100 176 0 853 --:--:-- --:--:-- --:--:-- 854 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 9109k 0 0 100 9109k 0 32.3M --:--:-- --:--:-- --:--:-- 32.3M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 16 0 0 100 16 0 61 --:--:-- --:--:-- --:--:-- 61 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 39 0 0 100 39 0 208 --:--:-- --:--:-- --:--:-- 209 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/cifuzz-example Finished Step #11 Starting Step #12 - "compile-honggfuzz-address-x86_64" Step #12 - "compile-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": vm.mmap_rnd_bits = 28 Step #12 - "compile-honggfuzz-address-x86_64": Skipping compilation; using precompiled honggfuzz Step #12 - "compile-honggfuzz-address-x86_64": done. Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": CC=clang Step #12 - "compile-honggfuzz-address-x86_64": CXX=clang++ Step #12 - "compile-honggfuzz-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp Step #12 - "compile-honggfuzz-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ Step #12 - "compile-honggfuzz-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": + make clean Step #12 - "compile-honggfuzz-address-x86_64": rm -fv *.a *.o *unittest *_fuzzer *_seed_corpus.zip crash-* *.zip Step #12 - "compile-honggfuzz-address-x86_64": ++ nproc Step #12 - "compile-honggfuzz-address-x86_64": + make -j32 all Step #12 - "compile-honggfuzz-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ -std=c++11 my_api.cpp -c Step #12 - "compile-honggfuzz-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ -std=c++11 -c -o standalone_fuzz_target_runner.o standalone_fuzz_target_runner.cpp Step #12 - "compile-honggfuzz-address-x86_64": ar ruv my_api.a my_api.o Step #12 - "compile-honggfuzz-address-x86_64": ar: `u' modifier ignored since `D' is the default (see `U') Step #12 - "compile-honggfuzz-address-x86_64": ar: creating my_api.a Step #12 - "compile-honggfuzz-address-x86_64": a - my_api.o Step #12 - "compile-honggfuzz-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ -std=c++11 do_stuff_unittest.cpp my_api.a -o do_stuff_unittest Step #12 - "compile-honggfuzz-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ -std=c++11 do_stuff_fuzzer.cpp my_api.a /usr/lib/libFuzzingEngine.a -o do_stuff_fuzzer Step #12 - "compile-honggfuzz-address-x86_64": do_stuff_fuzzer.cpp:18:1: warning: non-void function does not return a value in all control paths [-Wreturn-type] Step #12 - "compile-honggfuzz-address-x86_64": 18 | } Step #12 - "compile-honggfuzz-address-x86_64": | ^ Step #12 - "compile-honggfuzz-address-x86_64": 1 warning generated. Step #12 - "compile-honggfuzz-address-x86_64": zip -q -r do_stuff_fuzzer_seed_corpus.zip do_stuff_test_data Step #12 - "compile-honggfuzz-address-x86_64": + find . -name '*_fuzzer' -exec cp -v '{}' /workspace/out/honggfuzz-address-x86_64 ';' Step #12 - "compile-honggfuzz-address-x86_64": './do_stuff_fuzzer' -> '/workspace/out/honggfuzz-address-x86_64/do_stuff_fuzzer' Step #12 - "compile-honggfuzz-address-x86_64": + find . -name '*_fuzzer.dict' -exec cp -v '{}' /workspace/out/honggfuzz-address-x86_64 ';' Step #12 - "compile-honggfuzz-address-x86_64": './do_stuff_fuzzer.dict' -> '/workspace/out/honggfuzz-address-x86_64/do_stuff_fuzzer.dict' Step #12 - "compile-honggfuzz-address-x86_64": + find . -name '*_fuzzer.options' -exec cp -v '{}' /workspace/out/honggfuzz-address-x86_64 ';' Step #12 - "compile-honggfuzz-address-x86_64": + find . -name '*_fuzzer_seed_corpus.zip' -exec cp -v '{}' /workspace/out/honggfuzz-address-x86_64 ';' Step #12 - "compile-honggfuzz-address-x86_64": './do_stuff_fuzzer_seed_corpus.zip' -> '/workspace/out/honggfuzz-address-x86_64/do_stuff_fuzzer_seed_corpus.zip' Finished Step #12 - "compile-honggfuzz-address-x86_64" Starting Step #13 - "build-check-honggfuzz-address-x86_64" Step #13 - "build-check-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpf6jx1fcd/do_stuff_fuzzer Finished Step #13 - "build-check-honggfuzz-address-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/cifuzz-example Step #15: adding: do_stuff_fuzzer (deflated 67%) Step #15: adding: do_stuff_fuzzer.dict (deflated 22%) Step #15: adding: do_stuff_fuzzer_seed_corpus.zip (stored 0%) Step #15: adding: honggfuzz (deflated 62%) Step #15: adding: llvm-symbolizer (deflated 65%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 176 0 0 100 176 0 865 --:--:-- --:--:-- --:--:-- 866 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 3661k 0 0 100 3661k 0 14.3M --:--:-- --:--:-- --:--:-- 14.4M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 16 0 0 100 16 0 61 --:--:-- --:--:-- --:--:-- 61 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 39 0 0 100 39 0 219 --:--:-- --:--:-- --:--:-- 219 100 39 0 0 100 39 0 219 --:--:-- --:--:-- --:--:-- 217 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/cifuzz-example Finished Step #20 Starting Step #21 - "compile-libfuzzer-address-x86_64" Step #21 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #21 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": CC=clang Step #21 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #21 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #21 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #21 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": + make clean Step #21 - "compile-libfuzzer-address-x86_64": rm -fv *.a *.o *unittest *_fuzzer *_seed_corpus.zip crash-* *.zip Step #21 - "compile-libfuzzer-address-x86_64": ++ nproc Step #21 - "compile-libfuzzer-address-x86_64": + make -j32 all Step #21 - "compile-libfuzzer-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -std=c++11 my_api.cpp -c Step #21 - "compile-libfuzzer-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -std=c++11 -c -o standalone_fuzz_target_runner.o standalone_fuzz_target_runner.cpp Step #21 - "compile-libfuzzer-address-x86_64": ar ruv my_api.a my_api.o Step #21 - "compile-libfuzzer-address-x86_64": ar: `u' modifier ignored since `D' is the default (see `U') Step #21 - "compile-libfuzzer-address-x86_64": ar: creating my_api.a Step #21 - "compile-libfuzzer-address-x86_64": a - my_api.o Step #21 - "compile-libfuzzer-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -std=c++11 do_stuff_unittest.cpp my_api.a -o do_stuff_unittest Step #21 - "compile-libfuzzer-address-x86_64": clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -std=c++11 do_stuff_fuzzer.cpp my_api.a -fsanitize=fuzzer -o do_stuff_fuzzer Step #21 - "compile-libfuzzer-address-x86_64": do_stuff_fuzzer.cpp:18:1: warning: non-void function does not return a value in all control paths [-Wreturn-type] Step #21 - "compile-libfuzzer-address-x86_64": 18 | } Step #21 - "compile-libfuzzer-address-x86_64": | ^ Step #21 - "compile-libfuzzer-address-x86_64": 1 warning generated. Step #21 - "compile-libfuzzer-address-x86_64": zip -q -r do_stuff_fuzzer_seed_corpus.zip do_stuff_test_data Step #21 - "compile-libfuzzer-address-x86_64": + find . -name '*_fuzzer' -exec cp -v '{}' /workspace/out/libfuzzer-address-x86_64 ';' Step #21 - "compile-libfuzzer-address-x86_64": './do_stuff_fuzzer' -> '/workspace/out/libfuzzer-address-x86_64/do_stuff_fuzzer' Step #21 - "compile-libfuzzer-address-x86_64": + find . -name '*_fuzzer.dict' -exec cp -v '{}' /workspace/out/libfuzzer-address-x86_64 ';' Step #21 - "compile-libfuzzer-address-x86_64": './do_stuff_fuzzer.dict' -> '/workspace/out/libfuzzer-address-x86_64/do_stuff_fuzzer.dict' Step #21 - "compile-libfuzzer-address-x86_64": + find . -name '*_fuzzer.options' -exec cp -v '{}' /workspace/out/libfuzzer-address-x86_64 ';' Step #21 - "compile-libfuzzer-address-x86_64": + find . -name '*_fuzzer_seed_corpus.zip' -exec cp -v '{}' /workspace/out/libfuzzer-address-x86_64 ';' Step #21 - "compile-libfuzzer-address-x86_64": './do_stuff_fuzzer_seed_corpus.zip' -> '/workspace/out/libfuzzer-address-x86_64/do_stuff_fuzzer_seed_corpus.zip' Finished Step #21 - "compile-libfuzzer-address-x86_64" Starting Step #22 - "build-check-libfuzzer-address-x86_64" Step #22 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer Step #22 - "build-check-libfuzzer-address-x86_64": Retrying failed fuzz targets sequentially 1 Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer Step #22 - "build-check-libfuzzer-address-x86_64": Broken fuzz targets 1 Step #22 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer'], returncode=1, stdout=b"BAD BUILD: /tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer seems to have only partial coverage instrumentation.\nBAD BUILD: /tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer seems to have either startup crash or exit:\nvm.mmap_rnd_bits = 28\n/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 -dict=do_stuff_fuzzer.dict < /dev/null\nINFO: libFuzzer ignores flags that start with '--'\nDictionary: 3 entries\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (85 inline 8-bit counters): 85 [0x55f52656f020, 0x55f52656f075), \nINFO: Loaded 1 PC tables (85 PCs): 85 [0x55f52656f078,0x55f52656f5c8), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\n=================================================================\n==78==ERROR: AddressSanitizer: heap-use-after-free on address 0x7be8705e0170 at pc 0x55f5264dbef7 bp 0x7fff95029cf0 sp 0x7fff95029ce8\nREAD of size 4 at 0x7be8705e0170 thread T0\nSCARINESS: 45 (4-byte-read-heap-use-after-free)\n #0 0x55f5264dbef6 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:16:12\n #1 0x55f52637822d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #2 0x55f526379931 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #3 0x55f526379ea8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #4 0x55f526368d45 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #5 0x55f5263949a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #6 0x7fc87113c1c9 (/lib/x86_64-linux-gnu/libc.so.6+0x2a1c9) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e)\n #7 0x7fc87113c28a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2a28a) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e)\n #8 0x55f52635c094 in _start (/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer+0x4f094)\n\nDEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&)\n0x7be8705e0170 is located 0 bytes inside of 4-byte region [0x7be8705e0170,0x7be8705e0174)\nfreed by thread T0 here:\n #0 0x55f526497bf6 in free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:51:3\n #1 0x55f5264dbddd in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:15:5\n #2 0x55f52637822d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #3 0x55f526379931 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #4 0x55f526379ea8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #5 0x55f526368d45 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #6 0x55f5263949a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #7 0x7fc87113c1c9 (/lib/x86_64-linux-gnu/libc.so.6+0x2a1c9) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e)\n #8 0x7fc87113c28a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2a28a) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e)\n #9 0x55f52635c094 in _start (/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer+0x4f094)\n\nDEDUP_TOKEN: __interceptor_free--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)\npreviously allocated by thread T0 here:\n #0 0x55f526497e94 in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:67:3\n #1 0x55f5264dbdd2 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:14:21\n #2 0x55f52637822d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13\n #3 0x55f526379931 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3\n #4 0x55f526379ea8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3\n #5 0x55f526368d45 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6\n #6 0x55f5263949a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10\n #7 0x7fc87113c1c9 (/lib/x86_64-linux-gnu/libc.so.6+0x2a1c9) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e)\n #8 0x7fc87113c28a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2a28a) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e)\n #9 0x55f52635c094 in _start (/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer+0x4f094)\n\nDEDUP_TOKEN: __interceptor_malloc--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)\nSUMMARY: AddressSanitizer: heap-use-after-free /src/cifuzz-example/do_stuff_fuzzer.cpp:16:12 in LLVMFuzzerTestOneInput\nShadow bytes around the buggy address:\n 0x7be8705dfe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n 0x7be8705dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n 0x7be8705dff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n 0x7be8705e0000: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 03 fa\n 0x7be8705e0080: fa fa 03 fa fa fa 04 fa fa fa 00 00 fa fa 00 fa\n=>0x7be8705e0100: fa fa 00 fa fa fa 00 fa fa fa 01 fa fa fa[fd]fa\n 0x7be8705e0180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x7be8705e0200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x7be8705e0280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x7be8705e0300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x7be8705e0380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\nShadow byte legend (one shadow byte represents 8 application bytes):\n Addressable: 00\n Partially addressable: 01 02 03 04 05 06 07 \n Heap left redzone: fa\n Freed heap region: fd\n Stack left redzone: f1\n Stack mid redzone: f2\n Stack right redzone: f3\n Stack after return: f5\n Stack use after scope: f8\n Global redzone: f9\n Global init order: f6\n Poisoned by user: f7\n Container overflow: fc\n Array cookie: ac\n Intra object redzone: bb\n ASan internal: fe\n Left alloca redzone: ca\n Right alloca redzone: cb\n==78==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n", stderr=b'')) Step #22 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer seems to have only partial coverage instrumentation. Step #22 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer seems to have either startup crash or exit: Step #22 - "build-check-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #22 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 -dict=do_stuff_fuzzer.dict < /dev/null Step #22 - "build-check-libfuzzer-address-x86_64": INFO: libFuzzer ignores flags that start with '--' Step #22 - "build-check-libfuzzer-address-x86_64": Dictionary: 3 entries Step #22 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #22 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #22 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (85 inline 8-bit counters): 85 [0x55ce0a9c0020, 0x55ce0a9c0075), Step #22 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (85 PCs): 85 [0x55ce0a9c0078,0x55ce0a9c05c8), Step #22 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #22 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #22 - "build-check-libfuzzer-address-x86_64": ==120==ERROR: AddressSanitizer: heap-use-after-free on address 0x7b5f87ce0170 at pc 0x55ce0a92cef7 bp 0x7ffdcae2c070 sp 0x7ffdcae2c068 Step #22 - "build-check-libfuzzer-address-x86_64": READ of size 4 at 0x7b5f87ce0170 thread T0 Step #22 - "build-check-libfuzzer-address-x86_64": SCARINESS: 45 (4-byte-read-heap-use-after-free) Step #22 - "build-check-libfuzzer-address-x86_64": #0 0x55ce0a92cef6 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:16:12 Step #22 - "build-check-libfuzzer-address-x86_64": #1 0x55ce0a7c922d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #22 - "build-check-libfuzzer-address-x86_64": #2 0x55ce0a7ca931 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #22 - "build-check-libfuzzer-address-x86_64": #3 0x55ce0a7caea8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #22 - "build-check-libfuzzer-address-x86_64": #4 0x55ce0a7b9d45 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #22 - "build-check-libfuzzer-address-x86_64": #5 0x55ce0a7e59a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #22 - "build-check-libfuzzer-address-x86_64": #6 0x7f3f887e31c9 (/lib/x86_64-linux-gnu/libc.so.6+0x2a1c9) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e) Step #22 - "build-check-libfuzzer-address-x86_64": #7 0x7f3f887e328a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2a28a) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e) Step #22 - "build-check-libfuzzer-address-x86_64": #8 0x55ce0a7ad094 in _start (/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer+0x4f094) Step #22 - "build-check-libfuzzer-address-x86_64": Step #22 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0170 is located 0 bytes inside of 4-byte region [0x7b5f87ce0170,0x7b5f87ce0174) Step #22 - "build-check-libfuzzer-address-x86_64": freed by thread T0 here: Step #22 - "build-check-libfuzzer-address-x86_64": #0 0x55ce0a8e8bf6 in free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:51:3 Step #22 - "build-check-libfuzzer-address-x86_64": #1 0x55ce0a92cddd in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:15:5 Step #22 - "build-check-libfuzzer-address-x86_64": #2 0x55ce0a7c922d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #22 - "build-check-libfuzzer-address-x86_64": #3 0x55ce0a7ca931 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #22 - "build-check-libfuzzer-address-x86_64": #4 0x55ce0a7caea8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #22 - "build-check-libfuzzer-address-x86_64": #5 0x55ce0a7b9d45 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #22 - "build-check-libfuzzer-address-x86_64": #6 0x55ce0a7e59a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #22 - "build-check-libfuzzer-address-x86_64": #7 0x7f3f887e31c9 (/lib/x86_64-linux-gnu/libc.so.6+0x2a1c9) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e) Step #22 - "build-check-libfuzzer-address-x86_64": #8 0x7f3f887e328a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2a28a) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e) Step #22 - "build-check-libfuzzer-address-x86_64": #9 0x55ce0a7ad094 in _start (/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer+0x4f094) Step #22 - "build-check-libfuzzer-address-x86_64": Step #22 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: __interceptor_free--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) Step #22 - "build-check-libfuzzer-address-x86_64": previously allocated by thread T0 here: Step #22 - "build-check-libfuzzer-address-x86_64": #0 0x55ce0a8e8e94 in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:67:3 Step #22 - "build-check-libfuzzer-address-x86_64": #1 0x55ce0a92cdd2 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:14:21 Step #22 - "build-check-libfuzzer-address-x86_64": #2 0x55ce0a7c922d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:619:13 Step #22 - "build-check-libfuzzer-address-x86_64": #3 0x55ce0a7ca931 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:812:3 Step #22 - "build-check-libfuzzer-address-x86_64": #4 0x55ce0a7caea8 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:872:3 Step #22 - "build-check-libfuzzer-address-x86_64": #5 0x55ce0a7b9d45 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:917:6 Step #22 - "build-check-libfuzzer-address-x86_64": #6 0x55ce0a7e59a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #22 - "build-check-libfuzzer-address-x86_64": #7 0x7f3f887e31c9 (/lib/x86_64-linux-gnu/libc.so.6+0x2a1c9) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e) Step #22 - "build-check-libfuzzer-address-x86_64": #8 0x7f3f887e328a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2a28a) (BuildId: 274eec488d230825a136fa9c4d85370fed7a0a5e) Step #22 - "build-check-libfuzzer-address-x86_64": #9 0x55ce0a7ad094 in _start (/tmp/not-out/tmpehc9i5q_/do_stuff_fuzzer+0x4f094) Step #22 - "build-check-libfuzzer-address-x86_64": Step #22 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: __interceptor_malloc--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) Step #22 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: heap-use-after-free /src/cifuzz-example/do_stuff_fuzzer.cpp:16:12 in LLVMFuzzerTestOneInput Step #22 - "build-check-libfuzzer-address-x86_64": Shadow bytes around the buggy address: Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87cdfe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87cdff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87cdff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0000: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 03 fa Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0080: fa fa 03 fa fa fa 04 fa fa fa 00 00 fa fa 00 fa Step #22 - "build-check-libfuzzer-address-x86_64": =>0x7b5f87ce0100: fa fa 00 fa fa fa 00 fa fa fa 01 fa fa fa[fd]fa Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Step #22 - "build-check-libfuzzer-address-x86_64": 0x7b5f87ce0380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Step #22 - "build-check-libfuzzer-address-x86_64": Shadow byte legend (one shadow byte represents 8 application bytes): Step #22 - "build-check-libfuzzer-address-x86_64": Addressable: 00 Step #22 - "build-check-libfuzzer-address-x86_64": Partially addressable: 01 02 03 04 05 06 07 Step #22 - "build-check-libfuzzer-address-x86_64": Heap left redzone: fa Step #22 - "build-check-libfuzzer-address-x86_64": Freed heap region: fd Step #22 - "build-check-libfuzzer-address-x86_64": Stack left redzone: f1 Step #22 - "build-check-libfuzzer-address-x86_64": Stack mid redzone: f2 Step #22 - "build-check-libfuzzer-address-x86_64": Stack right redzone: f3 Step #22 - "build-check-libfuzzer-address-x86_64": Stack after return: f5 Step #22 - "build-check-libfuzzer-address-x86_64": Stack use after scope: f8 Step #22 - "build-check-libfuzzer-address-x86_64": Global redzone: f9 Step #22 - "build-check-libfuzzer-address-x86_64": Global init order: f6 Step #22 - "build-check-libfuzzer-address-x86_64": Poisoned by user: f7 Step #22 - "build-check-libfuzzer-address-x86_64": Container overflow: fc Step #22 - "build-check-libfuzzer-address-x86_64": Array cookie: ac Step #22 - "build-check-libfuzzer-address-x86_64": Intra object redzone: bb Step #22 - "build-check-libfuzzer-address-x86_64": ASan internal: fe Step #22 - "build-check-libfuzzer-address-x86_64": Left alloca redzone: ca Step #22 - "build-check-libfuzzer-address-x86_64": Right alloca redzone: cb Step #22 - "build-check-libfuzzer-address-x86_64": ==120==ABORTING Step #22 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #22 - "build-check-libfuzzer-address-x86_64": Step #22 - "build-check-libfuzzer-address-x86_64": Step #22 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #22 - "build-check-libfuzzer-address-x86_64": Base64: Step #22 - "build-check-libfuzzer-address-x86_64": Step #22 - "build-check-libfuzzer-address-x86_64": ERROR: 100.0% of fuzz targets seem to be broken. See the list above for a detailed information. Step #22 - "build-check-libfuzzer-address-x86_64": Build check automatically passing because of ignored targets. Finished Step #22 - "build-check-libfuzzer-address-x86_64" Starting Step #23 Step #23: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Finished Step #23 Starting Step #24 Step #24: Already have image: gcr.io/oss-fuzz/cifuzz-example Step #24: adding: crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 (stored 0%) Step #24: adding: do_stuff_fuzzer (deflated 66%) Step #24: adding: do_stuff_fuzzer.dict (deflated 22%) Step #24: adding: do_stuff_fuzzer_seed_corpus.zip (stored 0%) Step #24: adding: llvm-symbolizer (deflated 65%) Finished Step #24 Starting Step #25 Step #25: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #25: % Total % Received % Xferd Average Speed Time Time Time Current Step #25: Dload Upload Total Spent Left Speed Step #25: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 176 0 0 100 176 0 910 --:--:-- --:--:-- --:--:-- 911 Finished Step #25 Starting Step #26 Step #26: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #26: % Total % Received % Xferd Average Speed Time Time Time Current Step #26: Dload Upload Total Spent Left Speed Step #26: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4182k 0 0 100 4182k 0 14.3M --:--:-- --:--:-- --:--:-- 14.3M Finished Step #26 Starting Step #27 Step #27: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #27: % Total % Received % Xferd Average Speed Time Time Time Current Step #27: Dload Upload Total Spent Left Speed Step #27: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 16 0 0 100 16 0 78 --:--:-- --:--:-- --:--:-- 78 100 16 0 0 100 16 0 64 --:--:-- --:--:-- --:--:-- 64 Finished Step #27 Starting Step #28 Step #28: Already have image (with digest): gcr.io/cloud-builders/curl Step #28: % Total % Received % Xferd Average Speed Time Time Time Current Step #28: Dload Upload Total Spent Left Speed Step #28: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 39 0 0 100 39 0 222 --:--:-- --:--:-- --:--:-- 222 Finished Step #28 Starting Step #29 Step #29: Already have image: gcr.io/oss-fuzz/cifuzz-example Finished Step #29 PUSH DONE