starting build "f58e58b3-58d9-4a4e-b693-2df2ab4c39e5" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: dd0bbb17640b: Pulling fs layer Step #1: 62275a527176: Pulling fs layer Step #1: 111633040162: Pulling fs layer Step #1: 5bf7dd58428c: Pulling fs layer Step #1: 632c9b314f45: Pulling fs layer Step #1: 8ae501891266: Pulling fs layer Step #1: 3058f8e90c86: Pulling fs layer Step #1: c377fa4fb781: Pulling fs layer Step #1: 2336eb300fb9: Pulling fs layer Step #1: 09429854c898: Pulling fs layer Step #1: 71af8faf61ed: Pulling fs layer Step #1: 687fd097ee80: Pulling fs layer Step #1: 7f1e63401161: Pulling fs layer Step #1: cf8b5802c762: Pulling fs layer Step #1: 0e6dab0925eb: Pulling fs layer Step #1: f4bced45a7b2: Pulling fs layer Step #1: 2707ad88823d: Pulling fs layer Step #1: af6705528e9c: Pulling fs layer Step #1: 4e1005e0a6aa: Pulling fs layer Step #1: 118105242bd8: Pulling fs layer Step #1: 2aa39f787b87: Pulling fs layer Step #1: d3f87be3762e: Pulling fs layer Step #1: 6fd806021fc2: Pulling fs layer Step #1: 9d856dc172cd: Pulling fs layer Step #1: a987fc666fa1: Pulling fs layer Step #1: 233e05621483: Pulling fs layer Step #1: 0d3facbb2d8c: Pulling fs layer Step #1: aa9066b95eb6: Pulling fs layer Step #1: ff11ed875e6f: Pulling fs layer Step #1: 33f6a6d38c7e: Pulling fs layer Step #1: 111633040162: Waiting Step #1: 5ecd2cf410de: Pulling fs layer Step #1: 5bf7dd58428c: Waiting Step #1: 8ae501891266: Waiting Step #1: 632c9b314f45: Waiting Step #1: 702a45c3ae33: Pulling fs layer Step #1: df6fed191aed: Pulling fs layer Step #1: c377fa4fb781: Waiting Step #1: 09429854c898: Waiting Step #1: 71af8faf61ed: Waiting Step #1: 687fd097ee80: Waiting Step #1: f4bced45a7b2: Waiting Step #1: 2aa39f787b87: Waiting Step #1: 7f1e63401161: Waiting Step #1: 33f6a6d38c7e: Waiting Step #1: 2707ad88823d: Waiting Step #1: d3f87be3762e: Waiting Step #1: cf8b5802c762: Waiting Step #1: af6705528e9c: Waiting Step #1: 5ecd2cf410de: Waiting Step #1: 2336eb300fb9: Waiting Step #1: 233e05621483: Waiting Step #1: 702a45c3ae33: Waiting Step #1: df6fed191aed: Waiting Step #1: 118105242bd8: Waiting Step #1: aa9066b95eb6: Waiting Step #1: 0d3facbb2d8c: Waiting Step #1: 3058f8e90c86: Waiting Step #1: 0e6dab0925eb: Waiting Step #1: 6fd806021fc2: Waiting Step #1: a987fc666fa1: Waiting Step #1: ff11ed875e6f: Waiting Step #1: 62275a527176: Verifying Checksum Step #1: 62275a527176: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: 5bf7dd58428c: Verifying Checksum Step #1: 5bf7dd58428c: Download complete Step #1: 111633040162: Verifying Checksum Step #1: 111633040162: Download complete Step #1: 632c9b314f45: Download complete Step #1: 3058f8e90c86: Verifying Checksum Step #1: 3058f8e90c86: Download complete Step #1: dd0bbb17640b: Verifying Checksum Step #1: dd0bbb17640b: Download complete Step #1: c377fa4fb781: Verifying Checksum Step #1: c377fa4fb781: Download complete Step #1: b549f31133a9: Pull complete Step #1: 09429854c898: Verifying Checksum Step #1: 09429854c898: Download complete Step #1: 71af8faf61ed: Verifying Checksum Step #1: 71af8faf61ed: Download complete Step #1: 687fd097ee80: Verifying Checksum Step #1: 687fd097ee80: Download complete Step #1: 7f1e63401161: Verifying Checksum Step #1: 7f1e63401161: Download complete Step #1: cf8b5802c762: Verifying Checksum Step #1: cf8b5802c762: Download complete Step #1: 0e6dab0925eb: Verifying Checksum Step #1: 0e6dab0925eb: Download complete Step #1: 2336eb300fb9: Verifying Checksum Step #1: 2336eb300fb9: Download complete Step #1: f4bced45a7b2: Verifying Checksum Step #1: f4bced45a7b2: Download complete Step #1: 2707ad88823d: Verifying Checksum Step #1: 2707ad88823d: Download complete Step #1: af6705528e9c: Verifying Checksum Step #1: af6705528e9c: Download complete Step #1: 4e1005e0a6aa: Verifying Checksum Step #1: 4e1005e0a6aa: Download complete Step #1: 118105242bd8: Verifying Checksum Step #1: 118105242bd8: Download complete Step #1: 2aa39f787b87: Verifying Checksum Step #1: 2aa39f787b87: Download complete Step #1: d3f87be3762e: Verifying Checksum Step #1: d3f87be3762e: Download complete Step #1: 6fd806021fc2: Verifying Checksum Step #1: 6fd806021fc2: Download complete Step #1: 9d856dc172cd: Download complete Step #1: 8ae501891266: Verifying Checksum Step #1: 8ae501891266: Download complete Step #1: a987fc666fa1: Verifying Checksum Step #1: a987fc666fa1: Download complete Step #1: 233e05621483: Verifying Checksum Step #1: 233e05621483: Download complete Step #1: 0d3facbb2d8c: Verifying Checksum Step #1: 0d3facbb2d8c: Download complete Step #1: aa9066b95eb6: Verifying Checksum Step #1: aa9066b95eb6: Download complete Step #1: 33f6a6d38c7e: Verifying Checksum Step #1: 33f6a6d38c7e: Download complete Step #1: ff11ed875e6f: Verifying Checksum Step #1: ff11ed875e6f: Download complete Step #1: 5ecd2cf410de: Verifying Checksum Step #1: 5ecd2cf410de: Download complete Step #1: 702a45c3ae33: Verifying Checksum Step #1: 702a45c3ae33: Download complete Step #1: df6fed191aed: Verifying Checksum Step #1: df6fed191aed: Download complete Step #1: dd0bbb17640b: Pull complete Step #1: 62275a527176: Pull complete Step #1: 111633040162: Pull complete Step #1: 5bf7dd58428c: Pull complete Step #1: 632c9b314f45: Pull complete Step #1: 8ae501891266: Pull complete Step #1: 3058f8e90c86: Pull complete Step #1: c377fa4fb781: Pull complete Step #1: 2336eb300fb9: Pull complete Step #1: 09429854c898: Pull complete Step #1: 71af8faf61ed: Pull complete Step #1: 687fd097ee80: Pull complete Step #1: 7f1e63401161: Pull complete Step #1: cf8b5802c762: Pull complete Step #1: 0e6dab0925eb: Pull complete Step #1: f4bced45a7b2: Pull complete Step #1: 2707ad88823d: Pull complete Step #1: af6705528e9c: Pull complete Step #1: 4e1005e0a6aa: Pull complete Step #1: 118105242bd8: Pull complete Step #1: 2aa39f787b87: Pull complete Step #1: d3f87be3762e: Pull complete Step #1: 6fd806021fc2: Pull complete Step #1: 9d856dc172cd: Pull complete Step #1: a987fc666fa1: Pull complete Step #1: 233e05621483: Pull complete Step #1: 0d3facbb2d8c: Pull complete Step #1: aa9066b95eb6: Pull complete Step #1: ff11ed875e6f: Pull complete Step #1: 33f6a6d38c7e: Pull complete Step #1: 5ecd2cf410de: Pull complete Step #1: 702a45c3ae33: Pull complete Step #1: df6fed191aed: Pull complete Step #1: Digest: sha256:c14f2415c900600181b57d8093e730eca5852792378c243bf284a9be0b760f40 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> e17bfed5df09 Step #1: Step 2/7 : RUN apt-get update && apt-get install -y make cmake Step #1: ---> Running in b150c933a7ac Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:3 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (320 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: Suggested packages: Step #1: cmake-doc ninja-build lrzip Step #1: The following NEW packages will be installed: Step #1: cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 15.0 MB of archives. Step #1: After this operation, 65.0 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.4 [327 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 15.0 MB in 2s (8681 kB/s) Step #1: Selecting previously unselected package libicu66:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.4_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container b150c933a7ac Step #1: ---> 1507b866860c Step #1: Step 3/7 : RUN git clone https://github.com/mity/md4c Step #1: ---> Running in a67e924b6d95 Step #1: Cloning into 'md4c'... Step #1: Removing intermediate container a67e924b6d95 Step #1: ---> 13e0aa8f3cc6 Step #1: Step 4/7 : RUN git clone --depth 1 https://github.com/google/fuzzing && mv fuzzing/dictionaries/markdown.dict $SRC/fuzz-mdhtml.dict && rm -rf fuzzing Step #1: ---> Running in 55332405f484 Step #1: Cloning into 'fuzzing'... Step #1: Removing intermediate container 55332405f484 Step #1: ---> e75a74e3293f Step #1: Step 5/7 : RUN zip -j $SRC/fuzz-mdhtml_seed_corpus.zip $SRC/md4c/test/fuzzers/seed-corpus/* Step #1: ---> Running in 22c5db606b51 Step #1: adding: commonmark.md (deflated 40%) Step #1: adding: gfm.md (deflated 24%) Step #1: adding: latex-math.md (deflated 27%) Step #1: adding: wiki.md (deflated 8%) Step #1: Removing intermediate container 22c5db606b51 Step #1: ---> 7472be9df91d Step #1: Step 6/7 : WORKDIR $SRC/md4c Step #1: ---> Running in 07a5a1b33ea9 Step #1: Removing intermediate container 07a5a1b33ea9 Step #1: ---> 882c9ef71a0c Step #1: Step 7/7 : COPY build.sh $SRC/ Step #1: ---> 34c5fc8bfd39 Step #1: Successfully built 34c5fc8bfd39 Step #1: Successfully tagged gcr.io/oss-fuzz/md4c:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/md4c Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileOHrMUP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/md4c/.git Step #2 - "srcmap": + GIT_DIR=/src/md4c Step #2 - "srcmap": + cd /src/md4c Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/mity/md4c Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=481fbfbdf72daab2912380d62bb5f2187d438408 Step #2 - "srcmap": + jq_inplace /tmp/fileOHrMUP '."/src/md4c" = { type: "git", url: "https://github.com/mity/md4c", rev: "481fbfbdf72daab2912380d62bb5f2187d438408" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileWYNZoc Step #2 - "srcmap": + cat /tmp/fileOHrMUP Step #2 - "srcmap": + jq '."/src/md4c" = { type: "git", url: "https://github.com/mity/md4c", rev: "481fbfbdf72daab2912380d62bb5f2187d438408" }' Step #2 - "srcmap": + mv /tmp/fileWYNZoc /tmp/fileOHrMUP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileOHrMUP Step #2 - "srcmap": + rm /tmp/fileOHrMUP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/md4c": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/mity/md4c", Step #2 - "srcmap": "rev": "481fbfbdf72daab2912380d62bb5f2187d438408" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/fuzz-mdhtml_seed_corpus.zip /src/fuzz-mdhtml.dict /workspace/out/libfuzzer-coverage-x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd build Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake ../ -DBUILD_SHARED_LIBS=OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (0.2s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.0s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/md4c/build Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building C object src/CMakeFiles/md4c.dir/md4c.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Linking C static library libmd4c.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Built target md4c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object src/CMakeFiles/md4c-html.dir/md4c-html.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building C object src/CMakeFiles/md4c-html.dir/entity.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Linking C static library libmd4c-html.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Built target md4c-html Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building C object md2html/CMakeFiles/md2html.dir/cmdline.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building C object md2html/CMakeFiles/md2html.dir/md2html.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable md2html Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target md2html Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -c ../test/fuzzers/fuzz-mdhtml.c -I../src Step #3 - "compile-libfuzzer-coverage-x86_64": ../test/fuzzers/fuzz-mdhtml.c:29:13: warning: passing 'const uint8_t *' (aka 'const unsigned char *') to parameter of type 'const MD_CHAR *' (aka 'const char *') converts between pointers to integer types where one is of the unique plain 'char' type and the other is not [-Wpointer-sign] Step #3 - "compile-libfuzzer-coverage-x86_64": 29 | md_html(data, size, process_output, NULL, parser_flags, renderer_flags); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ../src/md4c-html.h:59:28: note: passing argument to parameter 'input' here Step #3 - "compile-libfuzzer-coverage-x86_64": 59 | int md_html(const MD_CHAR* input, MD_SIZE input_size, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fsanitize=fuzzer fuzz-mdhtml.o -o /workspace/out/libfuzzer-coverage-x86_64/fuzz-mdhtml ./src/libmd4c-html.a ./src/libmd4c.a Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: dd0bbb17640b: Already exists Step #4: 62275a527176: Already exists Step #4: 5fd16084d27b: Pulling fs layer Step #4: 3b4a256e94e2: Pulling fs layer Step #4: 1193775e083f: Pulling fs layer Step #4: f727a9982adf: Pulling fs layer Step #4: f8d818a221e1: Pulling fs layer Step #4: b9c799c7d67c: Pulling fs layer Step #4: 2591e08b7318: Pulling fs layer Step #4: bce2b20ed137: Pulling fs layer Step #4: aa6e1a4c641d: Pulling fs layer Step #4: b2d84ef78605: Pulling fs layer Step #4: 51141030c98b: Pulling fs layer Step #4: 1352417c166b: Pulling fs layer Step #4: 3e559a118ced: Pulling fs layer Step #4: 5ee64ebc3e2d: Pulling fs layer Step #4: b8fbef88b43f: Pulling fs layer Step #4: bca5011b5d98: Pulling fs layer Step #4: 4e6d480500bd: Pulling fs layer Step #4: f727a9982adf: Waiting Step #4: 5bf153eb29f2: Pulling fs layer Step #4: e5dd31db85a2: Pulling fs layer Step #4: 1dc362db725d: Pulling fs layer Step #4: bce2b20ed137: Waiting Step #4: f8d818a221e1: Waiting Step #4: 323475a2805d: Pulling fs layer Step #4: b2d84ef78605: Waiting Step #4: b9c799c7d67c: Waiting Step #4: 9746f385c510: Pulling fs layer Step #4: aa6e1a4c641d: Waiting Step #4: 2591e08b7318: Waiting Step #4: 0bf176c5c5f0: Pulling fs layer Step #4: 51141030c98b: Waiting Step #4: 3e559a118ced: Waiting Step #4: 5ee64ebc3e2d: Waiting Step #4: 1352417c166b: Waiting Step #4: 1dc362db725d: Waiting Step #4: b8fbef88b43f: Waiting Step #4: 4e6d480500bd: Waiting Step #4: bca5011b5d98: Waiting Step #4: 323475a2805d: Waiting Step #4: 5bf153eb29f2: Waiting Step #4: 9746f385c510: Waiting Step #4: 0bf176c5c5f0: Waiting Step #4: 5fd16084d27b: Download complete Step #4: 1193775e083f: Download complete Step #4: 3b4a256e94e2: Verifying Checksum Step #4: 3b4a256e94e2: Download complete Step #4: f8d818a221e1: Verifying Checksum Step #4: f8d818a221e1: Download complete Step #4: 5fd16084d27b: Pull complete Step #4: f727a9982adf: Verifying Checksum Step #4: f727a9982adf: Download complete Step #4: 2591e08b7318: Download complete Step #4: bce2b20ed137: Download complete Step #4: 3b4a256e94e2: Pull complete Step #4: aa6e1a4c641d: Verifying Checksum Step #4: aa6e1a4c641d: Download complete Step #4: 1193775e083f: Pull complete Step #4: b9c799c7d67c: Verifying Checksum Step #4: b9c799c7d67c: Download complete Step #4: 51141030c98b: Verifying Checksum Step #4: 51141030c98b: Download complete Step #4: f727a9982adf: Pull complete Step #4: 1352417c166b: Verifying Checksum Step #4: 1352417c166b: Download complete Step #4: 3e559a118ced: Verifying Checksum Step #4: 3e559a118ced: Download complete Step #4: f8d818a221e1: Pull complete Step #4: b8fbef88b43f: Verifying Checksum Step #4: b8fbef88b43f: Download complete Step #4: b2d84ef78605: Verifying Checksum Step #4: b2d84ef78605: Download complete Step #4: 5ee64ebc3e2d: Verifying Checksum Step #4: 5ee64ebc3e2d: Download complete Step #4: 4e6d480500bd: Verifying Checksum Step #4: 4e6d480500bd: Download complete Step #4: 5bf153eb29f2: Download complete Step #4: e5dd31db85a2: Verifying Checksum Step #4: e5dd31db85a2: Download complete Step #4: 1dc362db725d: Verifying Checksum Step #4: 1dc362db725d: Download complete Step #4: 323475a2805d: Verifying Checksum Step #4: 323475a2805d: Download complete Step #4: b9c799c7d67c: Pull complete Step #4: 9746f385c510: Verifying Checksum Step #4: 9746f385c510: Download complete Step #4: 0bf176c5c5f0: Verifying Checksum Step #4: 0bf176c5c5f0: Download complete Step #4: 2591e08b7318: Pull complete Step #4: bca5011b5d98: Verifying Checksum Step #4: bca5011b5d98: Download complete Step #4: bce2b20ed137: Pull complete Step #4: aa6e1a4c641d: Pull complete Step #4: b2d84ef78605: Pull complete Step #4: 51141030c98b: Pull complete Step #4: 1352417c166b: Pull complete Step #4: 3e559a118ced: Pull complete Step #4: 5ee64ebc3e2d: Pull complete Step #4: b8fbef88b43f: Pull complete Step #4: bca5011b5d98: Pull complete Step #4: 4e6d480500bd: Pull complete Step #4: 5bf153eb29f2: Pull complete Step #4: e5dd31db85a2: Pull complete Step #4: 1dc362db725d: Pull complete Step #4: 323475a2805d: Pull complete Step #4: 9746f385c510: Pull complete Step #4: 0bf176c5c5f0: Pull complete Step #4: Digest: sha256:0f990cc1311f94fde83d4a8a4c39464ca2bb422b54915be66a43e132a6eab309 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz-mdhtml.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz-mdhtml.zip or Step #5: /corpus/fuzz-mdhtml.zip.zip, and cannot find /corpus/fuzz-mdhtml.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz-mdhtml. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image md4c Step #5: python infra/helper.py build_fuzzers --sanitizer coverage md4c Step #5: python infra/helper.py coverage md4c Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1