starting build "fd42f756-15ed-47cf-ba24-95ba197e19f0" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38" Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Sending build context to Docker daemon 5.12kB Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": latest: Pulling from oss-fuzz-base/base-builder-rust Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": b549f31133a9: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 87c4ff13abc2: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f5014cf687ce: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 4eb5ff9778e5: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ec12a425070e: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 364fb5117e56: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 97edf38d96f1: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a14907ec4905: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 568525307682: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ff7a4a47a873: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 9395c2a653d5: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 42716c241593: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 845df394345e: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 030ae220bfdd: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a7562d81ffee: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d5dfff2fcb2e: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ab8a6589c816: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f8f8d82aafbe: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 70a57171064f: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 82138dadca74: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 8ba03a6cb7c8: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a44512d2607a: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a26a1d351f44: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 6f7df0ead00b: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 959a70dac85d: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a74b5fec131e: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 15e8ec56238c: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": c01a71e2a8a7: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d1d751083316: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d3d53b54b6a1: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 48929169ee59: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f2e1e5721cbe: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 421c4043393d: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 824048ba76a7: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 897dd12f10e0: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d573fe8ed4f5: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 5a71449afd23: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 50d1781c752e: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d03569bb8d15: Pulling fs layer Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 4eb5ff9778e5: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ec12a425070e: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 364fb5117e56: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 97edf38d96f1: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a14907ec4905: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 568525307682: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ff7a4a47a873: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 9395c2a653d5: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 42716c241593: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 15e8ec56238c: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": c01a71e2a8a7: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 845df394345e: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 030ae220bfdd: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d1d751083316: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d3d53b54b6a1: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a7562d81ffee: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 48929169ee59: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d5dfff2fcb2e: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f2e1e5721cbe: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ab8a6589c816: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 421c4043393d: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f8f8d82aafbe: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 824048ba76a7: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 70a57171064f: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 897dd12f10e0: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 82138dadca74: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d573fe8ed4f5: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 5a71449afd23: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 50d1781c752e: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d03569bb8d15: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 8ba03a6cb7c8: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 6f7df0ead00b: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a74b5fec131e: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 959a70dac85d: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a44512d2607a: Waiting Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f5014cf687ce: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f5014cf687ce: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": b549f31133a9: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": b549f31133a9: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ec12a425070e: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 4eb5ff9778e5: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 4eb5ff9778e5: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 97edf38d96f1: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 97edf38d96f1: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 87c4ff13abc2: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 87c4ff13abc2: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a14907ec4905: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": b549f31133a9: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ff7a4a47a873: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ff7a4a47a873: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 9395c2a653d5: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 9395c2a653d5: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 42716c241593: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 42716c241593: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 845df394345e: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 845df394345e: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 568525307682: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 568525307682: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 030ae220bfdd: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 030ae220bfdd: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a7562d81ffee: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a7562d81ffee: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d5dfff2fcb2e: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d5dfff2fcb2e: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ab8a6589c816: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ab8a6589c816: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f8f8d82aafbe: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f8f8d82aafbe: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 70a57171064f: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 70a57171064f: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 82138dadca74: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 82138dadca74: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 8ba03a6cb7c8: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 8ba03a6cb7c8: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a44512d2607a: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a44512d2607a: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 6f7df0ead00b: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 6f7df0ead00b: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a26a1d351f44: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a26a1d351f44: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 959a70dac85d: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 959a70dac85d: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a74b5fec131e: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 15e8ec56238c: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": c01a71e2a8a7: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": c01a71e2a8a7: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d1d751083316: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d1d751083316: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 87c4ff13abc2: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d3d53b54b6a1: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d3d53b54b6a1: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f5014cf687ce: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 364fb5117e56: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 364fb5117e56: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 48929169ee59: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 48929169ee59: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f2e1e5721cbe: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f2e1e5721cbe: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 421c4043393d: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 421c4043393d: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 824048ba76a7: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 824048ba76a7: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 897dd12f10e0: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 897dd12f10e0: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d573fe8ed4f5: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d573fe8ed4f5: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 5a71449afd23: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 5a71449afd23: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 50d1781c752e: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 50d1781c752e: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 4eb5ff9778e5: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ec12a425070e: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d03569bb8d15: Verifying Checksum Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d03569bb8d15: Download complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 364fb5117e56: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 97edf38d96f1: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a14907ec4905: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 568525307682: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ff7a4a47a873: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 9395c2a653d5: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 42716c241593: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 845df394345e: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 030ae220bfdd: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a7562d81ffee: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d5dfff2fcb2e: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ab8a6589c816: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f8f8d82aafbe: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 70a57171064f: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 82138dadca74: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 8ba03a6cb7c8: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a44512d2607a: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a26a1d351f44: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 6f7df0ead00b: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 959a70dac85d: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": a74b5fec131e: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 15e8ec56238c: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": c01a71e2a8a7: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d1d751083316: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d3d53b54b6a1: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 48929169ee59: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": f2e1e5721cbe: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 421c4043393d: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 824048ba76a7: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 897dd12f10e0: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d573fe8ed4f5: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 5a71449afd23: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": 50d1781c752e: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": d03569bb8d15: Pull complete Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Digest: sha256:a0e58a9395e8ba3355cf3acaee7a5ce55136eacbb20feddaba5289c95f532c83 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ---> 65868641afa3 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Step 2/4 : RUN git clone --depth 1 https://github.com/uutils/coreutils rust-coreutils Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ---> Running in 19d0bdfef469 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Cloning into 'rust-coreutils'... Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Removing intermediate container 19d0bdfef469 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ---> 046b42c749d0 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Step 3/4 : WORKDIR $SRC Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ---> Running in c57e3d0d7129 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Removing intermediate container c57e3d0d7129 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ---> e2060ba70987 Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Step 4/4 : COPY build.sh $SRC/ Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": ---> 5c36f95786cd Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Successfully built 5c36f95786cd Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Successfully tagged gcr.io/oss-fuzz/rust-coreutils:latest Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/rust-coreutils:latest Finished Step #1 - "build-6683b242-fd04-4662-8a5d-efd839781e38" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rust-coreutils Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filePjbw9N Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rust-coreutils/.git Step #2 - "srcmap": + GIT_DIR=/src/rust-coreutils Step #2 - "srcmap": + cd /src/rust-coreutils Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/uutils/coreutils Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=a4d7bcdf9c68dfaf3084bdc00f312f41bd522de5 Step #2 - "srcmap": + jq_inplace /tmp/filePjbw9N '."/src/rust-coreutils" = { type: "git", url: "https://github.com/uutils/coreutils", rev: "a4d7bcdf9c68dfaf3084bdc00f312f41bd522de5" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileukftyb Step #2 - "srcmap": + cat /tmp/filePjbw9N Step #2 - "srcmap": + jq '."/src/rust-coreutils" = { type: "git", url: "https://github.com/uutils/coreutils", rev: "a4d7bcdf9c68dfaf3084bdc00f312f41bd522de5" }' Step #2 - "srcmap": + mv /tmp/fileukftyb /tmp/filePjbw9N Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filePjbw9N Step #2 - "srcmap": + rm /tmp/filePjbw9N Step #2 - "srcmap": { Step #2 - "srcmap": "/src/rust-coreutils": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/uutils/coreutils", Step #2 - "srcmap": "rev": "a4d7bcdf9c68dfaf3084bdc00f312f41bd522de5" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/rust-coreutils Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstyle-query v1.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded adler2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arrayvec v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded const-random v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crunchy v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstyle v1.0.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded keccak v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding-macro-internal v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstream v0.6.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pkg-config v0.3.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded console v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_normalizer v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded phf_shared v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locale_core v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded potential_utf v0.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cpufeatures v0.2.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crypto-common v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerofrom v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded once_cell v1.21.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf16_iter v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded os_display v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_properties v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf8parse v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerofrom-derive v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded type-map v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded yoke-derive v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_normalizer_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerovec-derive v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror v2.0.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded yoke v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerotrie v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tempfile v3.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerovec v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand v0.9.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded winnow v0.7.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex v1.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jiff v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-bigint v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rayon v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerocopy v0.8.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locale_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unic-langid-impl v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-width v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v2.0.108 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-syntax v0.8.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded typenum v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_collator_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded procfs-core v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.177 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded procfs v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustix v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memchr v2.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde_core v1.0.228 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.228 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rayon-core v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded miniz_oxide v0.8.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-ident v1.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded similar v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nix v0.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded writeable v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-automata v0.4.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded smallvec v1.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded linux-raw-sys v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_collections v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha2 v0.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_core v0.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded self_cell v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustc-hash v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quote v1.0.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro2 v1.0.102 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha3 v0.10.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itertools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded z85 v3.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded version_check v0.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tinystr v0.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tiny-keccak v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded stable_deref_trait v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustversion v1.0.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_properties_data v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded wild v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded vsimd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror-impl v2.0.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded terminal_size v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sha1 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rust-ini v0.21.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_chacha v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ppv-lite86 v0.2.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded onig v6.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nom v8.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.2.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded errno v0.3.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded displaydoc v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded chrono v0.4.42 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.2.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded blake3 v1.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v2.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_collator v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bigdecimal v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf8_iter v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded siphasher v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libm v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.34 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded intl_pluralrules v7.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locale v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded iana-time-zone v0.1.64 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded flate2 v1.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-utils v0.8.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-epoch v0.9.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded colorchoice v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded clap_builder v4.5.50 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unic-langid v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded litemap v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_provider v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hex v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded glob v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded generic-array v0.14.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc-fast v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded binary-heap-plus v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ordered-multimap v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded log v0.4.28 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded is_terminal_polyfill v1.70.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded either v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded digest v0.10.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded onig_sys v69.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ctrlc v3.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded compare v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded blake2b_simd v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded base64-simd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded synstructure v0.13.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded strsim v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sm3 v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded simd-adler32 v0.3.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded md-5 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent-syntax v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent-bundle v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded find-msvc-tools v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fastrand v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded dlv-list v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding-macro v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc32fast v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cfg_aliases v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded const-random-macro v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded clap_lex v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded clap v4.5.50 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bytecount v0.6.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded block-buffer v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded autocfg v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded phf v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded parse_datetime v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded outref v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded number_prefix v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded intl-memoizer v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fluent-langneg v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-deque v0.8.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc-catalog v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cfg-if v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bstr v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded dunce v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded constant_time_eq v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anstyle-parse v0.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arrayref v0.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro2 v1.0.102 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-ident v1.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quote v1.0.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg-if v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.177 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling stable_deref_trait v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling typenum v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling autocfg v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling find-msvc-tools v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v2.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memchr v2.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustix v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling writeable v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerocopy v0.8.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling litemap v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linux-raw-sys v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror v2.0.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg_aliases v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf8parse v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustc-hash v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc32fast v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locale_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-syntax v0.8.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_normalizer_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling smallvec v1.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling iana-time-zone v0.1.64 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling simd-adler32 v0.3.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstyle-query v1.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling colorchoice v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling is_terminal_polyfill v1.70.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling adler2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nix v0.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstyle-parse v0.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling type-map v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_collator_data v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustversion v1.0.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libm v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstyle v1.0.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling procfs v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling miniz_oxide v0.8.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling self_cell v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc-catalog v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling constant_time_eq v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hex v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-width v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arrayvec v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arrayref v0.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling clap_lex v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cpufeatures v0.2.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anstream v0.6.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling strsim v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling siphasher v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling either v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling outref v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling generic-array v0.14.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling keccak v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf8_iter v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uucore v0.3.0 (/src/rust-coreutils/src/uucore) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bigdecimal v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vsimd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling phf_shared v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf16_iter v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling os_display v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling blake2b_simd v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling dunce v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling z85 v3.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itertools v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling wild v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling glob v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling number_prefix v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crunchy v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tiny-keccak v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-utils v0.8.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling once_cell v1.21.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling flate2 v1.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pkg-config v0.3.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rayon-core v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fastrand v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling phf v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling winnow v0.7.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling compare v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bytecount v0.6.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jiff v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling binary-heap-plus v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nom v8.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling similar v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling base64-simd v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v2.0.108 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uucore_procs v0.3.0 (/src/rust-coreutils/src/uucore_procs) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-epoch v0.9.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling chrono v0.4.42 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.34 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.2.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-deque v0.8.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling const-random-macro v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-bigint v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.2.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-automata v0.4.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sm3 v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha1 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha3 v0.10.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling md-5 v0.10.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sha2 v0.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling const-random v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling dlv-list v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling console v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rayon v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_core v0.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ordered-multimap v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ppv-lite86 v0.2.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rust-ini v0.21.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling procfs-core v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_chacha v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand v0.9.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling blake3 v1.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling onig_sys v69.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling synstructure v0.13.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ctrlc v3.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling terminal_size v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tempfile v3.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling clap_builder v4.5.50 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerofrom-derive v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling yoke-derive v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerovec-derive v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling displaydoc v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror-impl v2.0.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding-macro-internal v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling parse_datetime v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex v1.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bstr v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding-macro v0.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc-fast v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerofrom v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling yoke v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerovec v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerotrie v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent-syntax v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling clap v4.5.50 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling onig v6.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tinystr v0.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling potential_utf v0.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_collections v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unic-langid-impl v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locale_core v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unic-langid v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling intl-memoizer v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling intl_pluralrules v7.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent-langneg v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent-bundle v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fluent v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_provider v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_normalizer v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locale v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_properties v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_collator v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_env v0.3.0 (/src/rust-coreutils/src/uu/env) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_expr v0.3.0 (/src/rust-coreutils/src/uu/expr) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_wc v0.3.0 (/src/rust-coreutils/src/uu/wc) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_sort v0.3.0 (/src/rust-coreutils/src/uu/sort) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_split v0.3.0 (/src/rust-coreutils/src/uu/split) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_tr v0.3.0 (/src/rust-coreutils/src/uu/tr) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_echo v0.3.0 (/src/rust-coreutils/src/uu/echo) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uufuzz v0.3.0 (/src/rust-coreutils/fuzz/uufuzz) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_date v0.3.0 (/src/rust-coreutils/src/uu/date) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_printf v0.3.0 (/src/rust-coreutils/src/uu/printf) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_cksum v0.3.0 (/src/rust-coreutils/src/uu/cksum) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_test v0.3.0 (/src/rust-coreutils/src/uu/test) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_seq v0.3.0 (/src/rust-coreutils/src/uu/seq) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uu_cut v0.3.0 (/src/rust-coreutils/src/uu/cut) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uucore-fuzz v0.0.0 (/src/rust-coreutils/fuzz) Step #3 - "compile-libfuzzer-coverage-x86_64":  Finished `dev` profile [unoptimized + debuginfo] target(s) in 15.63s Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep 'name =' fuzz/Cargo.toml Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d"' -f2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v uucore-fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + PROG='fuzz_date Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_printf Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_echo Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_seq Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_sort Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_split Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_cut Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_wc Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_expr Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_test Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_seq_parse_number Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_parse_glob Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_parse_size Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_parse_time Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_tr Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_env Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_cksum Step #3 - "compile-libfuzzer-coverage-x86_64": fuzz_non_utf8_paths' Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_date /workspace/out/libfuzzer-coverage-x86_64/fuzz_date Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_printf /workspace/out/libfuzzer-coverage-x86_64/fuzz_printf Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_echo /workspace/out/libfuzzer-coverage-x86_64/fuzz_echo Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_seq /workspace/out/libfuzzer-coverage-x86_64/fuzz_seq Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_sort /workspace/out/libfuzzer-coverage-x86_64/fuzz_sort Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_split /workspace/out/libfuzzer-coverage-x86_64/fuzz_split Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_cut /workspace/out/libfuzzer-coverage-x86_64/fuzz_cut Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_wc /workspace/out/libfuzzer-coverage-x86_64/fuzz_wc Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_expr /workspace/out/libfuzzer-coverage-x86_64/fuzz_expr Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_test /workspace/out/libfuzzer-coverage-x86_64/fuzz_test Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_seq_parse_number /workspace/out/libfuzzer-coverage-x86_64/fuzz_seq_parse_number Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_parse_glob /workspace/out/libfuzzer-coverage-x86_64/fuzz_parse_glob Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_parse_size /workspace/out/libfuzzer-coverage-x86_64/fuzz_parse_size Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_parse_time /workspace/out/libfuzzer-coverage-x86_64/fuzz_parse_time Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_tr /workspace/out/libfuzzer-coverage-x86_64/fuzz_tr Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_env /workspace/out/libfuzzer-coverage-x86_64/fuzz_env Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_cksum /workspace/out/libfuzzer-coverage-x86_64/fuzz_cksum Step #3 - "compile-libfuzzer-coverage-x86_64": + for p in $PROG Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_non_utf8_paths /workspace/out/libfuzzer-coverage-x86_64/fuzz_non_utf8_paths Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 87c4ff13abc2: Already exists Step #4: f5014cf687ce: Already exists Step #4: 2f7d4ed00e9a: Pulling fs layer Step #4: 0a4ace941a7b: Pulling fs layer Step #4: 756eb3f7d5dc: Pulling fs layer Step #4: 5dad26ed7d1a: Pulling fs layer Step #4: e83bea77c7d6: Pulling fs layer Step #4: 5a56a369c240: Pulling fs layer Step #4: f73fc8764abb: Pulling fs layer Step #4: 3a044c512191: Pulling fs layer Step #4: 851b433cfbde: Pulling fs layer Step #4: 89eecd8a7478: Pulling fs layer Step #4: 6f182a4e151c: Pulling fs layer Step #4: 9e4261054f08: Pulling fs layer Step #4: d13b05f1d591: Pulling fs layer Step #4: f4aaa717d797: Pulling fs layer Step #4: 2b889369b68b: Pulling fs layer Step #4: c7cfa18b6e5a: Pulling fs layer Step #4: 0d9c9ea2f31a: Pulling fs layer Step #4: f6c12c5f38df: Pulling fs layer Step #4: 5a56a369c240: Waiting Step #4: f73fc8764abb: Waiting Step #4: db7b5d75a673: Pulling fs layer Step #4: 3a044c512191: Waiting Step #4: 5d4e31525a66: Pulling fs layer Step #4: 851b433cfbde: Waiting Step #4: 8c5d5145a761: Pulling fs layer Step #4: 79f63038b603: Pulling fs layer Step #4: 89eecd8a7478: Waiting Step #4: 6f182a4e151c: Waiting Step #4: 8765cb04258e: Pulling fs layer Step #4: 9e4261054f08: Waiting Step #4: c7cfa18b6e5a: Waiting Step #4: d13b05f1d591: Waiting Step #4: 0d9c9ea2f31a: Waiting Step #4: f4aaa717d797: Waiting Step #4: f6c12c5f38df: Waiting Step #4: db7b5d75a673: Waiting Step #4: 2b889369b68b: Waiting Step #4: 5d4e31525a66: Waiting Step #4: 8765cb04258e: Waiting Step #4: 8c5d5145a761: Waiting Step #4: 79f63038b603: Waiting Step #4: 5dad26ed7d1a: Waiting Step #4: e83bea77c7d6: Waiting Step #4: 756eb3f7d5dc: Download complete Step #4: 2f7d4ed00e9a: Download complete Step #4: 0a4ace941a7b: Verifying Checksum Step #4: 0a4ace941a7b: Download complete Step #4: 2f7d4ed00e9a: Pull complete Step #4: e83bea77c7d6: Verifying Checksum Step #4: e83bea77c7d6: Download complete Step #4: 5dad26ed7d1a: Verifying Checksum Step #4: 5dad26ed7d1a: Download complete Step #4: f73fc8764abb: Verifying Checksum Step #4: f73fc8764abb: Download complete Step #4: 0a4ace941a7b: Pull complete Step #4: 3a044c512191: Verifying Checksum Step #4: 3a044c512191: Download complete Step #4: 851b433cfbde: Verifying Checksum Step #4: 851b433cfbde: Download complete Step #4: 756eb3f7d5dc: Pull complete Step #4: 5a56a369c240: Verifying Checksum Step #4: 5a56a369c240: Download complete Step #4: 6f182a4e151c: Verifying Checksum Step #4: 6f182a4e151c: Download complete Step #4: 5dad26ed7d1a: Pull complete Step #4: 9e4261054f08: Verifying Checksum Step #4: 9e4261054f08: Download complete Step #4: e83bea77c7d6: Pull complete Step #4: d13b05f1d591: Download complete Step #4: 2b889369b68b: Verifying Checksum Step #4: 2b889369b68b: Download complete Step #4: 89eecd8a7478: Download complete Step #4: 0d9c9ea2f31a: Verifying Checksum Step #4: 0d9c9ea2f31a: Download complete Step #4: f6c12c5f38df: Verifying Checksum Step #4: f6c12c5f38df: Download complete Step #4: f4aaa717d797: Verifying Checksum Step #4: f4aaa717d797: Download complete Step #4: db7b5d75a673: Verifying Checksum Step #4: db7b5d75a673: Download complete Step #4: 8c5d5145a761: Verifying Checksum Step #4: 8c5d5145a761: Download complete Step #4: c7cfa18b6e5a: Verifying Checksum Step #4: c7cfa18b6e5a: Download complete Step #4: 8765cb04258e: Verifying Checksum Step #4: 8765cb04258e: Download complete Step #4: 5a56a369c240: Pull complete Step #4: 79f63038b603: Verifying Checksum Step #4: 79f63038b603: Download complete Step #4: f73fc8764abb: Pull complete Step #4: 5d4e31525a66: Verifying Checksum Step #4: 5d4e31525a66: Download complete Step #4: 3a044c512191: Pull complete Step #4: 851b433cfbde: Pull complete Step #4: 89eecd8a7478: Pull complete Step #4: 6f182a4e151c: Pull complete Step #4: 9e4261054f08: Pull complete Step #4: d13b05f1d591: Pull complete Step #4: f4aaa717d797: Pull complete Step #4: 2b889369b68b: Pull complete Step #4: c7cfa18b6e5a: Pull complete Step #4: 0d9c9ea2f31a: Pull complete Step #4: f6c12c5f38df: Pull complete Step #4: db7b5d75a673: Pull complete Step #4: 5d4e31525a66: Pull complete Step #4: 8c5d5145a761: Pull complete Step #4: 79f63038b603: Pull complete Step #4: 8765cb04258e: Pull complete Step #4: Digest: sha256:067d18a412ea92554193a61e443aa51231386b3964e295a8a77f318223d8ec60 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running fuzz_printf Step #5: Running fuzz_echo Step #5: Running fuzz_seq_parse_number Step #5: Running fuzz_cksum Step #5: Running fuzz_sort Step #5: Running fuzz_parse_glob Step #5: Running fuzz_env Step #5: Running fuzz_split Step #5: Running fuzz_parse_size Step #5: Running fuzz_cut Step #5: Running fuzz_seq Step #5: [2025-11-03 06:53:52,315 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:52,324 INFO] Finished finding shared libraries for targets. Step #5: [2025-11-03 06:53:52,543 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:52,553 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_echo_error.log Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_printf_error.log Step #5: Error occured while running fuzz_cut: Step #5: Cov returncode: 0, grep returncode: 0 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765138914 Step #5: MERGE-OUTER: 322 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765147697 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge2016.txt' Step #5: MERGE-INNER: 322 total files; 0 processed earlier; will process 322 files now Step #5: Running test ["cut", "-c10", "-b10", "-f1", "-c7", "LO3"] Step #5: === Compare result for: cut ["-c10", "-b10", "-f1", "-c7", "LO3"] Step #5: Pipe: ,,ud1bP🪓 Step #5: nRK7Jc(,XSh,🪛 Step #5: ️,gpJ,,8,1à Step #5: cÃ🪓OHb Step #5: j,dwGÃ,K1ÃÃwG, Step #5: md2Rz(,,3🪓🪓j,,Jy4 Step #5: Kd⚙nf2,🪓ÃAz🔩V,U9,r(PxhZec, Step #5: YKiJQ3 Step #5: q,🧰QU,fypa,1,lM🪛wxL( Step #5: a,🪓Ib,️0f Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-b10", "-f1", "-c7", "LO3"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["cut", "-d,", "-d,🪓", "-b7", "-c5"] Step #5: === Compare result for: cut ["-d,", "-d,🪓", "-b7", "-c5"] Step #5: Pipe: ,,ymt Step #5: L2ls Step #5: bNs7🧰Wa,QAZbÃ,6VI3rlS,UbZ, Step #5: o,02(,OtJ(a,l7 Step #5: Wb Step #5: ,,G🪓,ejl,Ã🪓 Step #5: Step #5: (P,🧰b,Jf6,mKmR,0jmt Step #5: uO Step #5: , Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,🪓", "-b7", "-c5"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-f3", "-b8", "-b1", "-b7"] Step #5: === Compare result for: cut ["-f3", "-b8", "-b1", "-b7"] Step #5: Pipe: ,,Y1🔗,,QL2️G Step #5: ,🔗s Step #5: F,jU5,J,6Ã3HzZhU8L,E Step #5: kBIpege8NJ,H,7, Step #5: 7LIjY Step #5: aEb,vxo,uv Step #5: ,P🔩,,y,Vv Step #5: TQLL7Sc🪓( Step #5: ,U Step #5: I5y,🪓9 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-b8", "-b1", "-b7"] Step #5: Step #5: Running test ["cut", "-f2"] Step #5: === Compare result for: cut ["-f2"] Step #5: Pipe: F,,2o,H Step #5: a,m,b🧰P Step #5: MnIÃ,70W,cmuwz,XDU,8b⚙🪓s Step #5: ÃQ Step #5: IICK🪓R,sFv,l,vxFz Step #5: ,zwoe4O,,1i Step #5: d,Ãet(,Rhwk Step #5: R404,(S2z,bL🧰🔗sr Step #5: C9bel(🔗D,rE,,g🪓🪓N,z2uJ6vt Step #5: m Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-d,", "-c4", "-b4"] Step #5: === Compare result for: cut ["-d,", "-c4", "-b4"] Step #5: Pipe: y,,nw3oy3PGe Step #5: ,vb7GJ,i🪓P Step #5: H️,P0FXB🧰,TlbC6à Step #5: tBsi(,,B,R(WÃJa3, Step #5: i,Ole,Z,ÃsS, Step #5: ig🔩a,️ Step #5: (qtUK,dN3️x,E,🪛ELvM Step #5: ,Ã8,,️Z🔩ÃEa, Step #5: 0id,J(Zh,,⚙sk,05O7T🪛7i Step #5: HZP,0l,T Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c4", "-b4"] Step #5: Step #5: Running test ["cut", "-b3", "-f2", "-f3", "-d,"] Step #5: === Compare result for: cut ["-b3", "-f2", "-f3", "-d,"] Step #5: Pipe: ,XB,og,,LFQsiHij Step #5: 🪓🪓JEL,6c Step #5: M️f,JE7T Step #5: 0Ã,(3,UM Step #5: Ãk,ÃkÃtnS,⚙(r9W,n1,7Sc Step #5: Step #5: ,D Step #5: 🧰G, Step #5: i(6Ã️,xwc,ÃÃSwbL🔩E Step #5: ntrt🪓,(Fzw️SÃJbd,,vBo1, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b3", "-f2", "-f3", "-d,"] Step #5: Step #5: Running test ["cut", "-d,", "-f1", "Ã3🪓m"] Step #5: === Compare result for: cut ["-d,", "-f1", "Ã3🪓m"] Step #5: Pipe: 4p,C,d,f Step #5: tYu(,Slvd8,UfI,🧰N,N2MkRk Step #5: ⚙9d(,J,,9XKupfxHO,i( Step #5: y,IfO,QYY,Tw🔩, Step #5: ,ÃIa,,(nK,yA74qgG71I Step #5: M,Ã9🪛yHv🪓a, Step #5: A,DWSx,V,se4Xd4( Step #5: ,U(5nXncIZY,,,E1C4JNi( Step #5: c🔗3YO🧰R,yz🔗,🧰d🪛SKA,v2m4 Step #5: LÃH7d5à Step #5: Rust stderr: Step #5: Ã3🪓m: No such file or directory Step #5: GNU stderr: Step #5: ''$'\303\203''3'$'\360\237\252\223''m': No such file or directory Step #5: --- START diff Step #5: -Ã3🪓m: No such file or directory Step #5: +''$'\303\203''3'$'\360\237\252\223''m': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-f1", "Ã3🪓m"] Step #5: Step #5: Running test ["cut", "-c3", "-b10", "-d,I", "-c6"] Step #5: === Compare result for: cut ["-c3", "-b10", "-d,I", "-c6"] Step #5: Pipe: m,SRD,B2D️T,Xu Step #5: TCJGw🪓L,aÃ8Eg,,(4🪛(,3 Step #5: Step #5: q,ÃnZ16il,xÃU🪓,ÃL, Step #5: B,,Ã, Step #5: 2Ff,egWgXlj,(,🪓J Step #5: ad️,à Step #5: f🪛Ã⚙y,,B Step #5: L⚙,⚙,(1ÃCxQP Step #5: ,,d,FvMC Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-b10", "-d,I", "-c6"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-f5", "-f2", "-d,"] Step #5: === Compare result for: cut ["-f5", "-f2", "-d,"] Step #5: Pipe: PnU,mR Step #5: S(,Nwknfq Step #5: (Fw,y Step #5: ndh,6 Step #5: Sy0,Ã,80v,rdu,07U🧰(W🧰à Step #5: d Step #5: 🪛,,T4EP🪓(AfD,,🔗b Step #5: M,N,XjeÃ,⚙Ls,Ro Step #5: HL,R🪛C,U,O Step #5: 🔩bWA,K, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-f2", "-d,"] Step #5: Step #5: Running test ["cut", "E(eKc", "-f2"] Step #5: === Compare result for: cut ["E(eKc", "-f2"] Step #5: Pipe: s Step #5: iYIW(,,KDÃa8R Step #5: a️tIg(q,z,,qalZ0T, Step #5: Q,pHwhh5,,k🔗y,l Step #5: Ã,M Step #5: h,lnet,,,PwwKnhY( Step #5: (h️t0,,dz2,🧰,zq3Qm Step #5: ,yB(,DK(ww Step #5: Mk1,,W74RZ🪛C,oa1,mEMpYUM Step #5: fH7whhVG,4🔗2y1As,, Step #5: Rust stderr: Step #5: E(eKc: No such file or directory Step #5: GNU stderr: Step #5: 'E(eKc': No such file or directory Step #5: --- START diff Step #5: -E(eKc: No such file or directory Step #5: +'E(eKc': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["E(eKc", "-f2"] Step #5: Step #5: Running test ["cut", "-b10", "v🔩Ãv", "-c3", "-b3", "-c6"] Step #5: === Compare result for: cut ["-b10", "v🔩Ãv", "-c3", "-b3", "-c6"] Step #5: Pipe: EFkRC Step #5: s(fL Step #5: ,r(GM, Step #5: fS3x🧰q,TsA(P,YÃsXXx,xÃÃHB Step #5: (,ÃR,Doc🔩Ar,, Step #5: 3,ZZ, Step #5: b Step #5: m, Step #5: ,C🧰I,2à Step #5: A,ÃPI,n5à Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b10", "v🔩Ãv", "-c3", "-b3", "-c6"] Step #5: Step #5: Running test ["cut", "-c1", "-b4", "-d,", "-c1", "-c6"] Step #5: === Compare result for: cut ["-c1", "-b4", "-d,", "-c1", "-c6"] Step #5: Pipe: ,,xYU,pQ(mY Step #5: q(XJtb,ÃS,️,️(vDÃso( Step #5: pIvKg,,e( Step #5: ImXcei,Ã,0rO, Step #5: A🔗Xy,️LOPÃ,6 Step #5: (,pY🔩C🪓qQd,Y,Ã6dfa🔩,G2Ktw Step #5: Y,Yq6rFDÃ(,🔩ÃS,FJ🧰nnJ,🔗 Step #5: R,(,dÃ,,(3p7 Step #5: ,Lup(5yKb,V9gkhÃJ️q,Mn(,5jMj1 Step #5: OÃt(à Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-b4", "-d,", "-c1", "-c6"] Step #5: Step #5: Running test ["cut", "-c10", "-d,"] Step #5: === Compare result for: cut ["-c10", "-d,"] Step #5: Pipe: ,,O,,dmN Step #5: ,Z, Step #5: H🪓amyQPGà Step #5: ,,G4,t Step #5: o1 Step #5: Zo(C(,ii🧰(2, Step #5: HX9,gxk4,R Step #5: ,i,, Step #5: td(isap,sBV🪛v,ols0R Step #5: ,O,(giNZ,UlÃwFa,y Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-d,"] Step #5: Step #5: Running test ["cut", "-d,⚙", "-b4", "-c1"] Step #5: === Compare result for: cut ["-d,⚙", "-b4", "-c1"] Step #5: Pipe: NaY Step #5: C,c8,7Ksb,OhTl,yMYmM Step #5: pXZ️t9,,6🧰 Step #5: R, Step #5: Step #5: T Step #5: 6t,i309vMBhv6 Step #5: 4🪓,J, Step #5: g Step #5: (ÃÃÃRFe,2🧰h(2v, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,⚙", "-b4", "-c1"] Step #5: Step #5: Running test ["cut", "-f2"] Step #5: === Compare result for: cut ["-f2"] Step #5: Pipe: 1🧰0E0,fTj🪛k Step #5: sEr,S,x,🧰(,ecDpSoVÃm Step #5: PCM🪓,x,yuq7,ÃJ( Step #5: YB1EVH,🧰O Step #5: 0JmÃuT,X,,Q4PmmvlUY Step #5: oKdy,,U🧰G Step #5: gD,ybQRdvf⚙tF,9np3JÃM, Step #5: Step #5: b Step #5: C7 Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c4", "((", "VUÃt8ÃtyRc27A", "-d,", "QtIDI🧰\u{fe0f}"] Step #5: === Compare result for: cut ["-c4", "((", "VUÃt8ÃtyRc27A", "-d,", "QtIDI🧰\u{fe0f}"] Step #5: Pipe: IOU🔩3ZsÃ,️Y,1iW Step #5: ,1J7N🔩,(,,E Step #5: IRhqMW(,c️QXqxy🔗,p3s Step #5: ,ÃE️ Step #5: ,( Step #5: iy️Lv,,W,(LML,k(8 Step #5: kl Step #5: LKqWJ,QU,R,Ãe, Step #5: DdOÃ,87HÃ5U5( Step #5: o,f⚙F,,g,jwG Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c4", "((", "VUÃt8ÃtyRc27A", "-d,", "QtIDI🧰\u{fe0f}"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-d,y", "-c7", "-d,", "-c1", "-f3", "7C🔗6ÃÃbalj"] Step #5: === Compare result for: cut ["-d,y", "-c7", "-d,", "-c1", "-f3", "7C🔗6ÃÃbalj"] Step #5: Pipe: s9HeIa1j,1, Step #5: Ou,1c🔗 Step #5: nLÃm,0QO,QsuDd🧰B🪛,9ZRlÃ,7H Step #5: Akv️1Ãt,(E🧰 Step #5: ,🪓,Q🪛⚙,⚙ÃYs1⚙,FcU🪛 Step #5: n,6Yfinp,Kba38(w, Step #5: ⚙7,k,I,j Step #5: si,f((tc,ÃRP⚙sqBK⚙r,,fx🪓 Step #5: 0SGgaS,,K,sJf Step #5: LX2,,s Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,y", "-c7", "-d,", "-c1", "-f3", "7C🔗6ÃÃbalj"] Step #5: Step #5: Running test ["cut", "-f5", "-b7"] Step #5: === Compare result for: cut ["-f5", "-b7"] Step #5: Pipe: P⚙,8u,,hKUY(x, Step #5: EqT5(u,🪛,xP,(🧰(oLK, Step #5: V, Step #5: ,(G,,V,f🪛 Step #5: sbà Step #5: 🧰2cnPfx🪓,M Step #5: cfdoD( Step #5: H,,(9N,Y( Step #5: s⚙🔗MadA,,ÃaQd,Z6(BO5🧰,c8B Step #5: yyhWd1HÃu Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-b7"] Step #5: Step #5: Running test ["cut", "-d,(", "-d,h", "-b8", "-b8"] Step #5: === Compare result for: cut ["-d,(", "-d,h", "-b8", "-b8"] Step #5: Pipe: ,kB,3eW,K Step #5: G,,, Step #5: ,,I Step #5: T🧰Z((🪛v(, Step #5: o83INgqP6,P,K1a9c Step #5: Ã,5b,m🧰🪛 Step #5: 5y,s🪓,BOAFXeu🔗(🪛,B( Step #5: fF🪓ÃDn,(c9️h,FtHY Step #5: 9Xg,,,9 Step #5: 5⚙jÃrK(,tÃ(,a7(8d(F Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,(", "-d,h", "-b8", "-b8"] Step #5: Step #5: Running test ["cut", "-b4"] Step #5: === Compare result for: cut ["-b4"] Step #5: Pipe: e Step #5: W,3WÃ3sf, Step #5: U,1bmrKb,m2🔗F,8 Step #5: Ã,LiÃn,oiD0vÃ,ii1W( Step #5: Ui,HWJU(à Step #5: o,bDUf Step #5: (T🔗I1pq,🧰Lw,p,Ã5⚙6à Step #5: ,pJ,7j4(MDq, Step #5: 7g,K,p Step #5: YbLx,6(6,sL🧰 Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,M"] Step #5: === Compare result for: cut ["-d,M"] Step #5: Pipe: 🔩(2P,UÃF(z,4🧰Y9🧰⚙A1,p Step #5: XÃyF,RU,qx,6Y7j🪛🪓,1n Step #5: j,⚙W️Ã6UFp Step #5: f2z,(Y, Step #5: 🔩v,2H(p, Step #5: zBiOIU,F,sU4à Step #5: OK4⚙vR Step #5: V,oQyX,N,🪛UXM,g Step #5: xH⚙,ÃD🧰pg,fOb Step #5: T,w5QBhiPF,Z( Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,M"] Step #5: Step #5: Running test ["cut", "-f3", "-f5", "-b4"] Step #5: === Compare result for: cut ["-f3", "-f5", "-b4"] Step #5: Pipe: ,At6,Ãv,U Step #5: tKKI,,(,F️,tw Step #5: pk🧰VY1,j4 Step #5: ,fNÃ🧰⚙,🧰1 Step #5: s🔗(,G(2Vg39Ih,geplT5⚙ Step #5: x️aà Step #5: RoFFK,E⚙,R, Step #5: Ãe Step #5: ,Q8L,(4⚙B,e🪛A Step #5: ,,,x,UÃG Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-f5", "-b4"] Step #5: Step #5: Running test ["cut", "-f3", "-b6", "-c4"] Step #5: === Compare result for: cut ["-f3", "-b6", "-c4"] Step #5: Pipe: R,m7P8E,b🪛,lED0dD🪛 Step #5: 64,A8M0,Pa(7,bIà Step #5: U,LNH,FÃy,,️uZsePBk5 Step #5: vMr Step #5: ,s3Lloa,LDBVz,,⚙1Mh Step #5: ZI🔩DÃ⚙️kJX,,9k,VHDV86🧰,hi(yN Step #5: 0 Step #5: 5,,W,Z0FzAEa Step #5: ,9ÃEeÃ0R,,️ Step #5: V,x,B Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-b6", "-c4"] Step #5: Step #5: Running test ["cut", "-b7"] Step #5: === Compare result for: cut ["-b7"] Step #5: Pipe: ,R,4H3 Step #5: p,7🔩ksJ8Z🪓,,XA7Ã🪓 Step #5: ,QOu,W Step #5: ,H️h2FMBd🪓,,ly3🔩I Step #5: ,DB(,q3y( Step #5: T Step #5: ,WNeqJ Step #5: (V(e Step #5: Step #5: 🔩,ÃeR,qd️Kf,🔩cCw Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b2", "🧰Stb4Ãi", "-b5", "3"] Step #5: === Compare result for: cut ["-b2", "🧰Stb4Ãi", "-b5", "3"] Step #5: Pipe: vCn,G️ Step #5: ,aZuW6Q,,cd,(y Step #5: 1(w⚙Y5(RÃ,1z9(b7Hj,S,3 Step #5: Ã,V0O,p Step #5: ,ÃfGFT8J,🧰(8🔗( Step #5: 🪓B🪛cv Step #5: YFXz(,p,Acak🪛,,T Step #5: Gw🔩, Step #5: Zi,,3X0uss Step #5: fug0p,(sYt,(w Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b2", "🧰Stb4Ãi", "-b5", "3"] Step #5: Step #5: Running test ["cut", "🧰t🧰"] Step #5: === Compare result for: cut ["🧰t🧰"] Step #5: Pipe: v,Ã2 Step #5: P6,3 Step #5: Jz1 Step #5: ,YBA,Ei Step #5: D,🪛p6(E,️k Step #5: 🪛 Step #5: cXd,9Eu4xav9,ÃhUtW🔗xTeP,0,NkJwuWY0 Step #5: U27⚙,,H,, Step #5: M🪛x🔗T Step #5: Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["🧰t🧰"] Step #5: Step #5: Running test ["cut", "-d,", "-d,", "-d,", "-b2", "-c6", "-f4"] Step #5: === Compare result for: cut ["-d,", "-d,", "-d,", "-b2", "-c6", "-f4"] Step #5: Pipe: 6Kz4e7,D,o5vMr🔗(8 Step #5: m(⚙OX,,t0o Step #5: an,lÃ,pÃÃm,88,Ap Step #5: J7️🔩,m🧰Y,Ã, Step #5: K6B⚙81 Step #5: 10🔗7,y,P,⚙ Step #5: ⚙,rx,wGQu, Step #5: ,EMMkJ,,RKMk Step #5: y⚙fÃs🔗 Step #5: I Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,", "-d,", "-b2", "-c6", "-f4"] Step #5: Step #5: Running test ["cut", "-d,E", "-d,", "-d,"] Step #5: === Compare result for: cut ["-d,E", "-d,", "-d,"] Step #5: Pipe: ⚙9V🪓F(J Step #5: VhN️G Step #5: V,WK,znW(Zy,Xd38Mc,Ã🪛 Step #5: Step #5: n Step #5: M,w9WF4,Op1CUÃ(,TW, Step #5: IÃ,sT,X Step #5: ,b,,LRbBH Step #5: ZFd🔩v,CGBW🔗🔩k Step #5: v,hR Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,E", "-d,", "-d,"] Step #5: Step #5: Running test ["cut", "-d,H"] Step #5: === Compare result for: cut ["-d,H"] Step #5: Pipe: omDRzà Step #5: VZR⚙l,NT🪛Css,5SL,Z,Z Step #5: Ã🔩(,M18w3 Step #5: ⚙4,,f(🧰ÃMsJw,,6⚙cvà Step #5: ,sUOTj🔗h,dLriYX,cx6 Step #5: bh(7s🪛e,E️SA Step #5: 6,sGOÃ🔗k Step #5: ,(,,o Step #5: 6YW3⚙uÃL,xF6N🔗 Step #5: 1Il,u Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,H"] Step #5: Step #5: Running test ["cut", "-d,", "-d,u", "-b3", "-b2", "-f5"] Step #5: === Compare result for: cut ["-d,", "-d,u", "-b3", "-b2", "-f5"] Step #5: Pipe: ,2️, Step #5: TVZD Step #5: 🪓, Step #5: ,🪛,yROUvPRSw Step #5: 72d🔗lsBi,Wd Step #5: ,v,à Step #5: gfCB1x,a Step #5: D,2MFXi, Step #5: Jx🔗NR6 Step #5: ÃÃj🔩M Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,u", "-b3", "-b2", "-f5"] Step #5: Step #5: Running test ["cut", "-c7", "-f4"] Step #5: === Compare result for: cut ["-c7", "-f4"] Step #5: Pipe: ⚙ Step #5: 🔩c,,,qTÃ6T(g,M Step #5: t️ Step #5: CWTFSi Step #5: ,,ÃAKUNI Step #5: JMjUVt, Step #5: WyC5⚙ÃiÃÃk,,(ak🔩H,O, Step #5: (D,n0YOX Step #5: (8X2, Step #5: ,🔩YRvzAf Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c7", "-f4"] Step #5: Step #5: Running test ["cut", "-f3", "9d2gbZÃ"] Step #5: === Compare result for: cut ["-f3", "9d2gbZÃ"] Step #5: Pipe: ,,E Step #5: KÃÃ,,qv,b,8( Step #5: w🪓 Step #5: Y,F2,U⚙ Step #5: ÃÃH,W2S🧰((f🪛,oÃ, Step #5: J Step #5: C2d3⚙,IÃc Step #5: bu, Step #5: ️,w(wJS0GC Step #5: SwMB((N,dca🔗2f,0Ãjb🔩4🧰 Step #5: Rust stderr: Step #5: 9d2gbZÃ: No such file or directory Step #5: GNU stderr: Step #5: '9d2gbZ'$'\303\203': No such file or directory Step #5: --- START diff Step #5: -9d2gbZÃ: No such file or directory Step #5: +'9d2gbZ'$'\303\203': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "9d2gbZÃ"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: 3UL,Iz,Em,7pIyxYUZ( Step #5: w,A5 Step #5: aZt10Q,🔩,o(zÃy🪓nTv Step #5: Jm⚙quN Step #5: x,H🔗M39(Cl4, Step #5: ,cVHLM8PcT,9,3hCm,1🪛 Step #5: S🪓🧰W9 Step #5: ,CBh666Ãy7R,🔗bz Step #5: HF Step #5: Md,Gg8Jm Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-f4", "-b4", "-c4", "-c1"] Step #5: === Compare result for: cut ["-f4", "-b4", "-c4", "-c1"] Step #5: Pipe: 2⚙,,(,c️MW🔗dÃ,xb Step #5: 0Q0K,ÃG2,ibR5Ne,v🧰2 Step #5: ( Step #5: ,kgf9 Step #5: R0,Rp5pPU0, Step #5: qGGMP🪛,v4(OR,t(qUE,(bÃO⚙4n Step #5: 🔩d,UÃ,,by7jr( Step #5: kA,l Step #5: 28(LkV Step #5: ,,pcK,z🧰4m Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-b4", "-c4", "-c1"] Step #5: Step #5: Running test ["cut", "-c3", "-f1", "7", "-b1", "tyH🔗(sÃs9bB"] Step #5: === Compare result for: cut ["-c3", "-f1", "7", "-b1", "tyH🔗(sÃs9bB"] Step #5: Pipe: TZ Step #5: (M,Ã2RtB,Pr Step #5: T2kZiUO0,l, Step #5: 7 Step #5: K8, Step #5: ,W🪛MX Step #5: ÃA2,TX⚙6inkLK,8p,z3X Step #5: V(,GLe,RÃ,(sN5 Step #5: ,TS⚙ Step #5: Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-f1", "7", "-b1", "tyH🔗(sÃs9bB"] Step #5: Step #5: Running test ["cut", "-f2", "-d,6"] Step #5: === Compare result for: cut ["-f2", "-d,6"] Step #5: Pipe: a6,,wTw,6ms Step #5: 37c,L1,🪓(Y,VO Step #5: a,SÃBWi(,⚙eygd3T Step #5: B,s🪓9,gHQT7aG Step #5: Mf5(Z⚙,hz6J38q Step #5: E Step #5: ,IPgG,,tf️U Step #5: 0Jx7EO,dg(Sp,(🔗 Step #5: Step #5: D(r(7,🔩,n Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f2", "-d,6"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: ,(db88r,VMI(,C,H Step #5: f1 Step #5: yj,,y(,EhÃ,EZJz7🔗Ag Step #5: (2x,,4YxQUeX Step #5: ,u Step #5: 6,SÃP,oEzKp,ÃÃhMiW Step #5: U,Q,L Step #5: e7Nzf,38,TX9KRA🪛 Step #5: spE Step #5: NZGT,ÃC,,EptÃ,2l Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-b3", "-b8", "-c9", "-f3"] Step #5: === Compare result for: cut ["-b3", "-b8", "-c9", "-f3"] Step #5: Pipe: 3u🔩7FpZ0,,0AVyÃ,v Step #5: FuU,,30dà Step #5: K Step #5: 6,fo,,uAFbxwÃi Step #5: 🔗(,a,C,R️,u14H Step #5: 8Ãt5,W(ÃfUr,C6Ã53a,i Step #5: wd,pq4,(dK🪛 Step #5: ISsv(oo Step #5: q1Nh(PÃ,4q(E1FX,,2y9, Step #5: k5 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b3", "-b8", "-c9", "-f3"] Step #5: Step #5: Running test ["cut", "-f3", "-f4", "-b2", "-f2"] Step #5: === Compare result for: cut ["-f3", "-f4", "-b2", "-f2"] Step #5: Pipe: iB,(u🔗,QKÃ58inÃ,I Step #5: Z🧰 Step #5: FQ,🧰gH,( Step #5: Step #5: pB,j⚙️🧰sI Step #5: Z,4TC,l🪛f3Ã, Step #5: 🧰m,🔗BY,jxn0p( Step #5: ,oÃSUr,,3à Step #5: K5X,X Step #5: Ão🔩J,JÃW,ÃÃN,SVEQ,X🪓t Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-f4", "-b2", "-f2"] Step #5: Step #5: Running test ["cut", "-b6", "-c1", "m", "-b10"] Step #5: === Compare result for: cut ["-b6", "-c1", "m", "-b10"] Step #5: Pipe: tt9ZHp Step #5: Xo9c,, Step #5: qgPg Step #5: Fd Step #5: ,7kVadQÃ,PhsIohDD Step #5: Ol🧰,f9k,,1,P9w58((J️ Step #5: 5 Step #5: 🔗,MG(B,x,,RO6Qfju(a Step #5: Wi,MsDm,(,A,WWpvF(⚙1 Step #5: bwfBgl🧰((,🔗hÃgT7Ã,FuB1, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b6", "-c1", "m", "-b10"] Step #5: Step #5: Running test ["cut", "-d,c"] Step #5: === Compare result for: cut ["-d,c"] Step #5: Pipe: (5,k🧰,🔗Tecro,Q Step #5: le Step #5: sÃ,H,Ã🔩,, Step #5: ((,y,,vT,7mVfZK Step #5: u3 Step #5: , Step #5: W(8h,q,(AIMqAox,, Step #5: ,6C Step #5: ,1BKaKYGD,lut,e Step #5: uU,e,KdrrQ4lÃs,iA️6 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,c"] Step #5: Step #5: Running test ["cut", "-c7", "-f5", "-f3", "fep", "-b1"] Step #5: === Compare result for: cut ["-c7", "-f5", "-f3", "fep", "-b1"] Step #5: Pipe: 🔗ÃQa Step #5: nx91n Step #5: ,, Step #5: bws,Y9O🔩 Step #5: ,Z🔗n Step #5: ,à Step #5: by🔩ds,3,🧰 Step #5: 0W(Q,,jF0,️w Step #5: n(,e6sLgL🔩,aWuÃ(,mHJ🪛df, Step #5: 009ÃxfRTS,yl,🪓Zzno,,w(6 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c7", "-f5", "-f3", "fep", "-b1"] Step #5: Step #5: Running test ["cut", "-f3", "-b8", "-c5"] Step #5: === Compare result for: cut ["-f3", "-b8", "-c5"] Step #5: Pipe: , Step #5: vEW7z🪓 Step #5: L70i(SvJ,hV(,9ELax,3,SPwn Step #5: ,FZxm4 Step #5: rz Step #5: ,F Step #5: 9 Step #5: (o(🪓Q Step #5: Step #5: A Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-b8", "-c5"] Step #5: Step #5: Running test ["cut", "d", "ILzwohFÃGe83nT", "-f5", "-f2", "-b4", "BGZU4"] Step #5: === Compare result for: cut ["d", "ILzwohFÃGe83nT", "-f5", "-f2", "-b4", "BGZU4"] Step #5: Pipe: W,3A1,75KHÃW Step #5: y,🪓, Step #5: Ã🪓D,(🔗0,P,7,ErÃS Step #5: Step #5: Ã(,,, Step #5: V Step #5: Ãuqib,,i0O️,️agQb⚙a Step #5: 🧰x Step #5: Zp,,7Ãil,aEW, Step #5: ,,🪛hq4,Ak490J Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["d", "ILzwohFÃGe83nT", "-f5", "-f2", "-b4", "BGZU4"] Step #5: Step #5: Running test ["cut", "-b4", "-f2", "-d,G"] Step #5: === Compare result for: cut ["-b4", "-f2", "-d,G"] Step #5: Pipe: 🔗c,R🧰 Step #5: e2🪛K,Im,RÃ1 Step #5: vKy,,KÃYÃlp,TeoE,g Step #5: Ewi6,uP Step #5: ,S,jU,H1q6F🧰 Step #5: my,BHE,mHx3,i(IPU,(z Step #5: ZN(gs,V,🧰I Step #5: Dp,0 Step #5: Ãzl5z3(,dk,,(,3 Step #5: 🔗🔗VfB,elBDum,qnso,h,(iBG(y Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b4", "-f2", "-d,G"] Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: 🪓m🔩 Step #5: 4, Step #5: ️,9ODSÃmf,Dbe Step #5: r3DW7,,q Step #5: ÃHp Step #5: 🔩,5,(V Step #5: 0iXoo,w Step #5: 🔗 Step #5: ,e🔗️ob,,l🧰8M Step #5: AugJ,wFXIic,mHy,vpÃ,1b Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b2"] Step #5: === Compare result for: cut ["-b2"] Step #5: Pipe: WJ, Step #5: Ã,z Step #5: f1(UWO3Q,uZmnZlaR(,,Sdl Step #5: PW4rQQn,,,Wzps Step #5: R,,K Step #5: k4(🔗 Step #5: 🪓 Step #5: , Step #5: SD🔩SMm(,5,🔗,VÃbA,M Step #5: XgÃk3Ã,jmÃ,🔩OfT,U Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: A5rwGk, Step #5: sJ,,G3L🪛smÃ🪓V Step #5: ,E,4lB,A Step #5: jp Step #5: bA,,,🧰🔗D Step #5: 7à Step #5: 7(b,,3d,Sà Step #5: 9LQFu,,,Af,iBoQ(RÃg Step #5: Step #5: xh🔗bax,,,à Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-d,", "-b10", "-f2", "-d,", "-b4"] Step #5: === Compare result for: cut ["-d,", "-b10", "-f2", "-d,", "-b4"] Step #5: Pipe: UMPP⚙xKÃe,WhÃ,,,D Step #5: q(f,S,0🧰W,,3nmDP(Lot Step #5: cIhN,,L,1Ly5(,3oe🪓YLa Step #5: ,t3,🧰gÃ,,e🔗(z Step #5: Step #5: , Step #5: (,ÃrBHb,jP,gG Step #5: pwtx4Q52,(Ã, Step #5: Step #5: nme1🪓,2GjkCkyYT,🔩Y Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-b10", "-f2", "-d,", "-b4"] Step #5: Step #5: Running test ["cut", "SnL⚙"] Step #5: === Compare result for: cut ["SnL⚙"] Step #5: Pipe: tW, Step #5: jMCD,Hxj,GlpZ(Ã, Step #5: 6A,TD,LWWF1 Step #5: ,7od624,Ã(4f,,️ Step #5: 🧰K,l0Ff⚙P,Os Step #5: I Step #5: W,,K Step #5: 0GeG, Step #5: ,8I0KiOJ,v,ÃO Step #5: 21TEM,aV,NXB🔩V,9⚙(,srà Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["SnL⚙"] Step #5: Step #5: Running test ["cut", "-c2", "-b9"] Step #5: === Compare result for: cut ["-c2", "-b9"] Step #5: Pipe: 🔗po🪓gh🔩5( Step #5: S(,,oxzm1,41 Step #5: 🪓Oev🔩(,,Ãj(H7kv(b Step #5: g,a,️lÃ,aTYÃfa2 Step #5: z⚙H, Step #5: (,,ÃCNQ Step #5: ,️w Step #5: RGAÃoHeqDW,,6 Step #5: QiU🔩,3t Step #5: mV Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c2", "-b9"] Step #5: Step #5: Running test ["cut", "-d,t", "-b9", "F"] Step #5: === Compare result for: cut ["-d,t", "-b9", "F"] Step #5: Pipe: Q,,h Step #5: 🪓ÃeB,eF,JSWX7,1 Step #5: 9 Step #5: ,yE,,pKM3Ux,c🧰 Step #5: ÃQ Step #5: e(R️Z,wjP Step #5: 3 Step #5: A9🪛uux Step #5: 1Fbl(,(,4,J Step #5: omoLP6Q6,🪓,🔗B Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,t", "-b9", "F"] Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: HKP Step #5: D Step #5: crKCÃCia,ZSpGi(Y1 Step #5: fbkLO,le(QÃ,tZ8,xnHÃÃslll,beS🔗EX5BB Step #5: c8U,z,GyfIZYC,zÃDj2🪛e,z Step #5: ,,XÃWg,SZ Step #5: xg,E( Step #5: YQ️gHAl,Kf,OV,W, Step #5: Step #5: ,yTÃ(0bU Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b8", "-b3"] Step #5: === Compare result for: cut ["-b8", "-b3"] Step #5: Pipe: dl1j Step #5: ,ylJH6ÃR, Step #5: Step #5: Hg,USjyZ,S Step #5: sY8VRlxL,sTV,à Step #5: 9j,iqsG Step #5: e,️4i,R,gÃ3IU🧰(🔩à Step #5: ,(,sÃd,T Step #5: 🔩, Step #5: t,TP Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b8", "-b3"] Step #5: Step #5: Running test ["cut", "-c5", "-f5", "-d,d", "-b10", "-c10", "-c7"] Step #5: === Compare result for: cut ["-c5", "-f5", "-d,d", "-b10", "-c10", "-c7"] Step #5: Pipe: ebo Step #5: I,9b,w Step #5: j25,cY2,(🧰,j Step #5: l6,(z1,gOvs Step #5: 🪛75,F,,yjpÃ((2, Step #5: 🪛qTm🪓oM,⚙a🪓R,5Ã,t Step #5: n,,Ià Step #5: ️D,10,,EX Step #5: 🔗evCCn5I,8Wrq Step #5: Ãa,u,o Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c5", "-f5", "-d,d", "-b10", "-c10", "-c7"] Step #5: Step #5: Running test ["cut", "-b6"] Step #5: === Compare result for: cut ["-b6"] Step #5: Pipe: ️PYzzDF,B,0️Y,9,C Step #5: ️1R,hsQp🪛oZb🧰 Step #5: cD1xb,Pq,r,cKa,TiV7 Step #5: JF2Mlt,Ão08,P,L(H,t🪛c Step #5: P7vT5G,3FZNE,K5🪓,Ã🧰CQ,Q Step #5: llj Step #5: ÃrDZ🔗,z,v,à Step #5: lh Step #5: vÃ7K,2,Ã️T,LF2 Step #5: 🔗d3xhvSgh Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,🔩", "-d,1", "-d,"] Step #5: === Compare result for: cut ["-d,🔩", "-d,1", "-d,"] Step #5: Pipe: h,⚙D🧰r2,,AE Step #5: N Step #5: I,🪓iogJx Step #5: ,hVKLÃT🪛🪓,0,T0Q Step #5: (,(SpÃGg(🧰 Step #5: qdO,4,ca,Ã7Mj,Np Step #5: ,(KjV,à Step #5: er,n🔗O(B,,(FXMNkycwy,W0 Step #5: VeA Step #5: 7B,BÃ6w,N⚙g Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,🔩", "-d,1", "-d,"] Step #5: Step #5: Running test ["cut", "-c10", "DQ"] Step #5: === Compare result for: cut ["-c10", "DQ"] Step #5: Pipe: 4,7d(,Ã️XZ,(CFoà Step #5: HfG🔗QR,,rJ(Ã,RP Step #5: ,RÃFUS Step #5: ,⚙,(bbF2, Step #5: 5pf238f9f9,b🪛Ãt6z,8(J Step #5: L🧰(4,F,HGo,BQfS2i,KTF8xvMF Step #5: S4f,⚙, Step #5: ,q,,A0jq Step #5: aC Step #5: 🔩🔗🧰PMVjxx Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c6", "-d,h", "-f4", "cyX0A"] Step #5: === Compare result for: cut ["-c6", "-d,h", "-f4", "cyX0A"] Step #5: Pipe: Z🧰Qf Step #5: K,qQ️5x,bATI⚙ Step #5: ,,,6U Step #5: 1f6Dw,(,D(Rokf Step #5: K,4,vM3 Step #5: ,(7m🔗ÃYiÃ,W⚙Ã4T,q3r🪛D Step #5: 2bCXfC,,bW🪛 Step #5: ,DxeÃ,,6XXYw84S Step #5: RP🔩,tPk3s Step #5: 9,bj1U Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c6", "-d,h", "-f4", "cyX0A"] Step #5: Step #5: Running test ["cut", "prh2l", "-d,B", "-c2", "-f5"] Step #5: === Compare result for: cut ["prh2l", "-d,B", "-c2", "-f5"] Step #5: Pipe: j(,,,r⚙(,Ãn8️2h Step #5: LÃÃX,sÃvlf🪓🪓z Step #5: O🪓5,N,,gR Step #5: vVDG,nse🪛eV,tÃs,q(mÃ,Ãg7(a4ÃYT Step #5: aPV Step #5: ,1nM,ERQAQ,PV,1 Step #5: 🔗🪓Ãxp7,mK(v,jVpqk,ug5(,⚙ Step #5: ,F Step #5: wDI️,AEtB2V,,,9c Step #5: Ãuz,( Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["prh2l", "-d,B", "-c2", "-f5"] Step #5: Step #5: Running test ["cut", "-d,9", "-c8", "-f2", "-b2"] Step #5: === Compare result for: cut ["-d,9", "-c8", "-f2", "-b2"] Step #5: Pipe: uBluSu️,G, Step #5: z(mX7ux9Y(,ktb Step #5: ,4,AREQB🔩C,GLVV,(TWFbr Step #5: T5lEÃ,,,,W Step #5: ️FuCPtKBt6 Step #5: oYde,Ecs️tT,j6W,tb54AÃ,🪓WeVdR Step #5: , Step #5: CK⚙bu681xq,( Step #5: 9,(,, Step #5: Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,9", "-c8", "-f2", "-b2"] Step #5: Step #5: Running test ["cut", "-d,", "QtrAZw(NZ", "-f1", "-b9"] Step #5: === Compare result for: cut ["-d,", "QtrAZw(NZ", "-f1", "-b9"] Step #5: Pipe: R,l,tÃjQVL Step #5: Step #5: LZoerpN,MnFqa,,vVw🪛,Q Step #5: ,Xy65,mS Step #5: D,c,b🪓1🧰Qs3,🪓ROPT, Step #5: (S,W,,BB8,M( Step #5: w🧰F,i,🔩(uE2ÃG(B Step #5: 🪛 Step #5: ⚙kyK Step #5: 14Cx42O,zt,(l49,o(️ Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "QtrAZw(NZ", "-f1", "-b9"] Step #5: Step #5: Running test ["cut", "-b7", "-d,", "-c5", "-b10", "NÃar7V"] Step #5: === Compare result for: cut ["-b7", "-d,", "-c5", "-b10", "NÃar7V"] Step #5: Pipe: j,c,ÃjÃ,Ã6Gà Step #5: spj,XÃQDzC,🪛N,veHnOaÃ⚙a️, Step #5: (️T,3,Ãb Step #5: o,4,J Step #5: ,,🪓h Step #5: ,6m,️yz,, Step #5: ,lYoÃÃÃ🔗 Step #5: ff86f Step #5: (🔗️E⚙,🔗,EH,Fu🧰sW,🔩Z( Step #5: ,t,UQ,x9🔩qK,2🔗HmXtnT0B Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b7", "-d,", "-c5", "-b10", "NÃar7V"] Step #5: Step #5: Running test ["cut", "-c10", "-d,", "-b9"] Step #5: === Compare result for: cut ["-c10", "-d,", "-b9"] Step #5: Pipe: k,,i(EVP7 Step #5: z🪓ÃV5Q1,Bv4zE,sERsaj,MCTM Step #5: iQ Step #5: Dg(5,vXu(1Z, Step #5: 3ÃPV,R,,1 Step #5: L,z,Aq🧰T🪛turr🪓,XyZÃ(️,U Step #5: V⚙,lBA Step #5: 8,dd️e2 Step #5: YVÃNJhqMl(,,0O,, Step #5: 🔗U🪓,J Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-d,", "-b9"] Step #5: Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-d,🪓", "-f5", "-c4", "🪓"] Step #5: === Compare result for: cut ["-d,🪓", "-f5", "-c4", "🪓"] Step #5: Pipe: g️r0q,,8🧰,( Step #5: Step #5: eA🔩,,0ÃgW9UlL,LEDqIr,djJ Step #5: 2ch,s,J Step #5: 2VFlkD,GÃ🔗BLC🔩,Y,8,G90h🔗AA Step #5: BaÃx8🧰,g3,dw,,4🔩bVB Step #5: Y,g,ÃÃsZ6N,ON🔗,xToh7 Step #5: 6rdheF4🔩,,xY🧰 Step #5: IsÃH,K4ia🪓,x3N5I,o26,🪛 Step #5: ÃpISiÃ,tsglZ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,🪓", "-f5", "-c4", "🪓"] Step #5: Step #5: Running test ["cut", "-d,F", "-d,e", "-f1", "-d,", "6w"] Step #5: === Compare result for: cut ["-d,F", "-d,e", "-f1", "-d,", "6w"] Step #5: Pipe: ,B,M1z( Step #5: LH,, Step #5: jRq,4VcVVO(Ã🧰,kPxa,Zb🪓pÃloA1 Step #5: 1OY,l1,rÃX Step #5: wo6,W,M Step #5: (uYEE,jheHQ,4YoZ3NnI,CCHqG🪛H🔩 Step #5: 3w,,DY2T45Ã,P3,Ã⚙ Step #5: P,d Step #5: ,n,N,(DB Step #5: ià Step #5: Rust stderr: Step #5: 6w: No such file or directory Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -6w: No such file or directory Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,F", "-d,e", "-f1", "-d,", "6w"] Step #5: Step #5: Running test ["cut", "-c4", "-b10", "-f1", "-d,b"] Step #5: === Compare result for: cut ["-c4", "-b10", "-f1", "-d,b"] Step #5: Pipe: kJI2,Scm5 Step #5: sa,gà Step #5: T,Ef,POS🧰(Ãb Step #5: (wY, Step #5: 2,s306g,5EQ,pNPL2bL Step #5: ,Ã,ÃDAAÃEr🪓s Step #5: B4JELu🧰,8ÃrbF,0XH, Step #5: D2O3 Step #5: ,,,,aej Step #5: lbHS,JMqRw,D,( Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c4", "-b10", "-f1", "-d,b"] Step #5: Step #5: Running test ["cut", "-d,U", "-b3", "-b8", "-b10"] Step #5: === Compare result for: cut ["-d,U", "-b3", "-b8", "-b10"] Step #5: Pipe: LCOÃ,300x,dQNcf🪓Gu,xd⚙🪓N68,f1J9rSj Step #5: c,B(V80Wk,in3🔩,z Step #5: ️à Step #5: F,C((A,,zj,t Step #5: QA,8 Step #5: Q,4,P🪓z Step #5: x,,Oe🪓,efJ Step #5: ,,Ã,,b01T5(Ycjm Step #5: 7,Odb((dj Step #5: Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,U", "-b3", "-b8", "-b10"] Step #5: Step #5: Running test ["cut", "-d,", "Z", "-b2", "-b4"] Step #5: === Compare result for: cut ["-d,", "Z", "-b2", "-b4"] Step #5: Pipe: Zc,,,wju Step #5: f9Qqj,d,o Step #5: FlPrY,(iR8,y, Step #5: YNxÃ7Cfp,T(🪛, Step #5: SdFBge Step #5: ,🪛🪓🪓s Step #5: 4,K6p🔩S,,🔗 Step #5: Ã(5🔗,V,m,p Step #5: R,jg Step #5: 2XqR,5(,wJ,(a5F,(FJ Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "Z", "-b2", "-b4"] Step #5: Step #5: Running test ["cut", "-d,P", "-d,"] Step #5: === Compare result for: cut ["-d,P", "-d,"] Step #5: Pipe: 🪓i7Hgq,Ã, Step #5: 26 Step #5: aT4anLL,SÃfUjmB,RS Step #5: Nu,JÃ,9IK,g(C Step #5: ️H,0pJ⚙eÃeFb,Ã🪛🪓JEQA4 Step #5: ️EtÃX,EFK,T9WNÃF6Ib,is Step #5: h((1SkI Step #5: m9K,0 Step #5: zDL,️C1O Step #5: I,s🔩b,5Hs️,ka,F Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,P", "-d,"] Step #5: Step #5: Running test ["cut", "-d,🔗", "-f1", "-d,", "-c8"] Step #5: === Compare result for: cut ["-d,🔗", "-f1", "-d,", "-c8"] Step #5: Pipe: ,pYà Step #5: rq🪛GÃ,lz1h,R(k Step #5: E,TqiF️,Wd5TZ Step #5: 🔗⚙2,E,rHXde,uxD,🪓jR Step #5: ,Tps22 Step #5: OnÃeQV,g,B Step #5: x Step #5: 1,ioGqI,,U5HyC Step #5: ,,ie Step #5: CEqbMu2LA,26,ÃZ8,ÃRtw🔗G Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,🔗", "-f1", "-d,", "-c8"] Step #5: Step #5: Running test ["cut", "-c3", "-f3"] Step #5: === Compare result for: cut ["-c3", "-f3"] Step #5: Pipe: ,(,bp1A,Nj55,2(c1 Step #5: 🧰In8, Step #5: M Step #5: ,0,ÃX, Step #5: x3Ãv7mY Step #5: 🧰⚙9a,,lÃU🪛,jjpz,5 Step #5: ,U7,5Z,m7c Step #5: l,9🪓(⚙eC1y,1ful🧰,t,f Step #5: VuI(E️lU⚙,zAwCw(y, Step #5: ,⚙sutx,g🧰 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-f3"] Step #5: Step #5: Running test ["cut", "-c7", "-f2"] Step #5: === Compare result for: cut ["-c7", "-f2"] Step #5: Pipe: k,🪓Up3x9n,MKL,Mv🪓5n, Step #5: ,,yld,ClF,vNsE Step #5: Iaz,q🧰,,⚙🔗X Step #5: q(I,IM(, Step #5: ,Tpj,uknZ Step #5: ,He8DmJ,FghhLrR, Step #5: m6 Step #5: PaMyt,,U Step #5: V Step #5: Us(,60🪛ÃTb Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c7", "-f2"] Step #5: Step #5: Running test ["cut", "-c3"] Step #5: === Compare result for: cut ["-c3"] Step #5: Pipe: 5ZD,t🔗Y1ali Step #5: CYÃ8V Step #5: ,⚙yA4Y🪓K,🔗iK(6 Step #5: US,yLqÃXs,tR4,oKp346o5,3 Step #5: 🪛A,y,ynUÃ,nl, Step #5: xj8,Ht, Step #5: ,8vr,z,6 Step #5: kid,NOO5Sat,1qmX,,( Step #5: hp,qnrGS,r, Step #5: zXZ,,fsELÃvzh,, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c6", "-f2", "-c4", "-b5", "-c10"] Step #5: === Compare result for: cut ["-c6", "-f2", "-c4", "-b5", "-c10"] Step #5: Pipe: C🪛,QZrfu(,r🔗,I Step #5: l,zrAj,🔗9🔗ft,nnppjE,3 Step #5: ,🔗F7Qz2 Step #5: Ã,E,Rr,,aeiJ Step #5: ÃEM🪛urh(Fp,GRU,,(H,d Step #5: ,Ei🪓,zd Step #5: ,(l🪛 Step #5: qY,W Step #5: F,qÃ5🧰rE5T, Step #5: YxBoLeI,d,FuKKjM Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c6", "-f2", "-c4", "-b5", "-c10"] Step #5: Step #5: Running test ["cut", "-c2", "-b5"] Step #5: === Compare result for: cut ["-c2", "-b5"] Step #5: Pipe: p🧰i Step #5: RtQmC3 Step #5: DawfF(,,nl2t9o🔩b(, Step #5: Pf5,B,2V,(,1UÃi1p Step #5: CM🪛ZS5,Rrb,WIcWH Step #5: h7,6 Step #5: y🔩c🪛yY0G,,0mb,g Step #5: ,M9M2n(yF9,(,f3 Step #5: x️,I3qI🪓7,n,C4,Ld Step #5: H(UTzH⚙,3 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c2", "-b5"] Step #5: Step #5: Running test ["cut", "-b2", "-b9"] Step #5: === Compare result for: cut ["-b2", "-b9"] Step #5: Pipe: KR,Ut(Y,Ãp,wY🔩ÃIx1J9, Step #5: ,R Step #5: Xv🔩w,,V Step #5: 🪛bk, Step #5: Gà Step #5: 0🪛,u️WG,Rf,ZuÃy Step #5: , Step #5: ,N7V🧰 Step #5: hs Step #5: qT6,Mh Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b2", "-b9"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: 🔗2o⚙NVG,vR(Yd, Step #5: E0(🔗K,4Ã2️z,C Step #5: 4 Step #5: kf🧰Aef,OSs🪛B Step #5: bKGd,gA,L Step #5: yk,B,ip,(Rdc🪓Y Step #5: O4,vw,2F793 Step #5: 0u🧰V(I,YVJ2L Step #5: vN,,pT0zQ8EsZ Step #5: RQI,🔩lUxm(Ã,Z44UE,0Ã,J Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-d,🪛", "-b3"] Step #5: === Compare result for: cut ["-d,🪛", "-b3"] Step #5: Pipe: ,Eml5,27Ãj Step #5: RXÃx,BfKo,UG️BZ⚙8,LOb🧰w Step #5: 7Mh72hk,,ds,CqxJMÃxEe7, Step #5: (VfKgT89,,o,BxQ Step #5: H,s5,ÃDs,a( Step #5: m Step #5: Step #5: 🔗gy,J Step #5: J Step #5: ÃTKfÃBÃm,SBWÃ,,x️⚙f,🪓 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,🪛", "-b3"] Step #5: Step #5: Running test ["cut", "-b9"] Step #5: === Compare result for: cut ["-b9"] Step #5: Pipe: (🪛h(zr,ExC,di,g🔗t,BkFd Step #5: KXM,I,ZZC Step #5: 🪓ZPi,V,🪛oa🔩D,4EVkà Step #5: U,yYyUPc,, Step #5: k,umAH,⚙42A,🪓L Step #5: ((,a9(,Ãt,(L8,Ãv Step #5: W🪛ÃÃ,,og🧰e8,e🔗,XvUC Step #5: FXRU,TrS,f(X(GN,CRz1jdqM Step #5: , Step #5: ,SH,,MNAuts Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b8", "-f3"] Step #5: === Compare result for: cut ["-b8", "-f3"] Step #5: Pipe: 3,yG,G🔗YZX Step #5: bmqDkd,(Z,️x3A2i🧰a6m, Step #5: xY,,Sw🔗0,8Ks(, Step #5: ZQbh,m4d,(,W🪓d(8,n Step #5: qHc,🧰j,️,,pf Step #5: Step #5: p,🪓q,,W Step #5: ,,(fper(H,2e Step #5: AWQ1️Qa,,WiFÃ,BsNYFs4(j,Rzt Step #5: ,🪛k,JmXYb,J Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b8", "-f3"] Step #5: Step #5: Running test ["cut", "-d,", "-d,"] Step #5: === Compare result for: cut ["-d,", "-d,"] Step #5: Pipe: ra,lÃPExsClr,tQqU🪛🔗8J,2Ãm, Step #5: yacVp,PihnG,d Step #5: ,hUpjÃD,,EwMNy Step #5: w, Step #5: Step #5: l⚙,UcS,,VÃRyy, Step #5: Z1m,kK,tC,DWpÃS7(h(️ Step #5: (1 Step #5: MPf33c🧰,,f🪓,D Step #5: Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,"] Step #5: Step #5: Running test ["cut", "-c3", "-c8", "-f5"] Step #5: === Compare result for: cut ["-c3", "-c8", "-f5"] Step #5: Pipe: 8t,(V🪛K, Step #5: Step #5: ncDS9i6️,AZet,MR3 Step #5: 🪛4l,,Ngq,n,X Step #5: K,Vd Step #5: M,WfQ🪓Y,(Nk,s Step #5: 39,HOele🔩🪓,(w0,Sc,T Step #5: AuÃJ(ÃKij,4 Step #5: XoÃ8hk,fr🪓 Step #5: Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-c8", "-f5"] Step #5: Step #5: Running test ["cut", "-d,R"] Step #5: === Compare result for: cut ["-d,R"] Step #5: Pipe: y,X2🔗Th🪛 Step #5: ,(yPÃJ⚙,v(,4q,z Step #5: wM,MIuAC,ÃAZ,Bu Step #5: 🔩, Step #5: sZ9YÃkmn,,w(983️x,hhLPÃxd2 Step #5: i Step #5: ( Step #5: v,,,7EEGt Step #5: ,(F,,B🧰A Step #5: ,rX🔗2I Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,R"] Step #5: Step #5: Running test ["cut", "-b7"] Step #5: === Compare result for: cut ["-b7"] Step #5: Pipe: K,🔩C6tÃU1(,fz,( Step #5: k(,9( Step #5: rRl Step #5: eix,(9nkbUZcd,ENqÃDGs,I7,KM Step #5: zH,q4,🧰q Step #5: T0Jpu8,bÃRY,TG,DwT,9B Step #5: (⚙(h,,w(,sr Step #5: R,bYBbTA Step #5: ÃQ⚙A,eqL Step #5: VPMÃZ,O,🪓zko, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "🪓", "-c2", "-d,C"] Step #5: === Compare result for: cut ["🪓", "-c2", "-d,C"] Step #5: Pipe: KAÃr6fQSg,(q Step #5: 6(gÃSÃÃ,e,Wu Step #5: ,ÃjYM,jrC, Step #5: j,,el⚙F5 Step #5: N Step #5: J3P,51 Step #5: 8,,s,8oT(,(️C2t️ Step #5: 8,,ÃG Step #5: QZ9K4, Step #5: M8( Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["🪓", "-c2", "-d,C"] Step #5: Step #5: Running test ["cut", "-f1", "-d,w"] Step #5: === Compare result for: cut ["-f1", "-d,w"] Step #5: Pipe: CFuA,Z,,Dà Step #5: 3 Step #5: GJ Step #5: K🧰U🔗,B, Step #5: s🧰(YP,g⚙4,SQ(cm6,okOC,Ã2y Step #5: ZÃ, Step #5: oB,vf,,47biT1 Step #5: ,,2s1KgZk,8( Step #5: Y,W,r, Step #5: ️oMEwD9ZpX,c⚙ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-d,w"] Step #5: Step #5: Running test ["cut", "-d,", "-f3", "-c1", "-f2", "-b3"] Step #5: === Compare result for: cut ["-d,", "-f3", "-c1", "-f2", "-b3"] Step #5: Pipe: g🧰,A,YG,C Step #5: Ã8 Step #5: DP3Rx,,wo Step #5: w🪛2mlF1,(vWZuUlr1 Step #5: Step #5: rkXI6(l,️Nxpa,xFOZPU,FWN,🧰 Step #5: ,,h6iÃK🔗B Step #5: c8 Step #5: ️, Step #5: 4C,QoxIOf,,H8tww,eLb9O4 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-f3", "-c1", "-f2", "-b3"] Step #5: Step #5: Running test ["cut", "-f4", "kG"] Step #5: === Compare result for: cut ["-f4", "kG"] Step #5: Pipe: ,j6🧰,fbDlc(r Step #5: hW,GsR⚙8,A,Ã(z, Step #5: 1 Step #5: Step #5: ,Ã,pD(S6(,QPTkytpxs,T Step #5: Ã⚙HL,FUrx,t,🔗D🪛Ã🧰,Ã🪓t(OZ Step #5: e,8cromYc,,zKMov02 Step #5: w, Step #5: (Kà Step #5: GxjTngx,Hz,h,,b Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f1", "-b5", "-b9", "-c9", "-c10"] Step #5: === Compare result for: cut ["-f1", "-b5", "-b9", "-c9", "-c10"] Step #5: Pipe: v,3MÃRrS Step #5: w,,Xlk,(7i🔩(8,w Step #5: 🪓🪓0,o, Step #5: (B,n,miyb0 Step #5: N,3C🔩YÃOPE,6lBEx,J Step #5: 🪓1,OC,, Step #5: i5e(,R6🪛i1Tnqu,v,gZ Step #5: w,v,, Step #5: yCD(fS Step #5: CuHWHÃeo Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-b5", "-b9", "-c9", "-c10"] Step #5: Step #5: Running test ["cut", "-b8", "-c8", "-f1", "ÃJ", "-b7"] Step #5: === Compare result for: cut ["-b8", "-c8", "-f1", "ÃJ", "-b7"] Step #5: Pipe: ️️0,Dquu Step #5: 4,️(6i,M Step #5: ,tFK,T,8c Step #5: 5h,vÃÃ🔗ISn3ti,18dmmO,(JrvQ,6c Step #5: a5(, Step #5: Ã,,IB77Aym🔗 Step #5: e🔗,0 Step #5: EO🪛,I Step #5: t,q🔗,a🧰🪛o🪛y,1 Step #5: ,ZLtK,(Ã(nvc🔗,(⚙UY Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b8", "-c8", "-f1", "ÃJ", "-b7"] Step #5: Step #5: Running test ["cut", "-f5", "-b6"] Step #5: === Compare result for: cut ["-f5", "-b6"] Step #5: Pipe: ÃxHWl8Ã, Step #5: Jt(pEXJ,, Step #5: aC,🪓X,8️ Step #5: ,c,C6(,tQ6ht0 Step #5: k🪛pR,jÃ,11🪓,P, Step #5: ,,162,D,XI Step #5: E🔗P🧰,VhnOYo Step #5: x,(1Dmux,K Step #5: Hà Step #5: 9E1Hko,N(k Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-b6"] Step #5: Step #5: Running test ["cut", "-b10"] Step #5: === Compare result for: cut ["-b10"] Step #5: Pipe: ,H,ÃNww0y,d4kZLjA Step #5: 9VyZ,DÃÃQ🧰 Step #5: YAL4c🧰Yt6, Step #5: u,IlWpw,u,rjV, Step #5: Step #5: tMae(,3Ysb,,WY(f, Step #5: bzt3,eg6xxH Step #5: t7Wm5U,,K579ÃguN9à Step #5: 7🔗Ã28,aTÃ(F0w,3DÃV Step #5: fPg( Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f4", "-b9", "-b6"] Step #5: === Compare result for: cut ["-f4", "-b9", "-b6"] Step #5: Pipe: ,wNI(ÃK7Ã2,,Kt4 Step #5: 6Qm Step #5: F,O(,6🔗ArDwH,WOn Step #5: ay(vÃ,V,0🪛 Step #5: ir🪓,,,v Step #5: 1O0,61Ã(Qmw,dH🧰,8 Step #5: (P Step #5: 5,BW,xiIK️t,IM Step #5: LQQbM6,m,oxqÃVA, Step #5: ,wb,ep96kX,gzI Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-b9", "-b6"] Step #5: Step #5: Running test ["cut", "-c9", "-c2"] Step #5: === Compare result for: cut ["-c9", "-c2"] Step #5: Pipe: ,bbX Step #5: ️,r,Bq Step #5: ,fjÃ,H, Step #5: wYYY Step #5: 3,6LMend️,3dWÃ,ÃE Step #5: ttHsrafÃ,oMcEmÃ🔩XM,b🔩t⚙p Step #5: ÃCÃ5fu, Step #5: 🧰3GFdU,JO, Step #5: FR5fQkA Step #5: HB,mV,d(x🧰jrÃZÃ,d,8m( Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c9", "-c2"] Step #5: Step #5: Running test ["cut", "-d,", "-d,q", "-b3", "-c4", "-f1"] Step #5: === Compare result for: cut ["-d,", "-d,q", "-b3", "-c4", "-f1"] Step #5: Pipe: K,aJ🔗um,aK,🔩 Step #5: ️v,️ Step #5: v,euVÃ,Ky0,t( Step #5: ÃgÃ,⚙vv Step #5: a🧰 Step #5: O🪛m1,cÃIeX3, Step #5: (,IQUOW,eH,5 Step #5: YGP️XUdm,s35yH,Tx Step #5: 1K,4E4Ãxi,️Ll,,AB Step #5: 4ÃuÃhilO,OUbJ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,q", "-b3", "-c4", "-f1"] Step #5: Step #5: Running test ["cut", "m", "-d,", "-c5", "-c10", "-b2", "-c2"] Step #5: === Compare result for: cut ["m", "-d,", "-c5", "-c10", "-b2", "-c2"] Step #5: Pipe: g,RseW9W,k🪛PbPZ Step #5: ,xXr6M,Qc🪛e10fJm Step #5: ,🪓 Step #5: AW Step #5: ,Yays5 Step #5: 🪛Z🪛V⚙,o,g,Gu Step #5: 0Z(N,bX2ek🔩,,MENw,PIl Step #5: Z,Ãà Step #5: ️,7(AAgd,6B,🔩ÃÃv🪓,Hsjn Step #5: r0j(X,xÃDG,ncBzs,,2 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["m", "-d,", "-c5", "-c10", "-b2", "-c2"] Step #5: Step #5: Running test ["cut", "-d,P"] Step #5: === Compare result for: cut ["-d,P"] Step #5: Pipe: z3⚙k,(3McPYXuB,Mz Step #5: ,3B🪛c,WÃb4,L5Dà Step #5: omSH5( Step #5: pÃIheÃQ(,V🪓ECHA Step #5: 🧰,,aky,7 Step #5: oG🪛x🧰(,qilm,Z🔗🔗c,(, Step #5: x Step #5: (Ã,,à Step #5: X5tDÃNt,H,w Step #5: ,8k,G(GnuH(Q Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,P"] Step #5: Step #5: Running test ["cut", "-f5", "-c5"] Step #5: === Compare result for: cut ["-f5", "-c5"] Step #5: Pipe: cT,x3 Step #5: HQuXWr🪓1p,H2Ã️,T Step #5: s7g,zHlH6Ã,L,(,ek(nà Step #5: ,j1NL,RP🪛77,st,pc Step #5: axuylF,Ã,️NqXlgJ(ÃU Step #5: H9HrVgÃ🔩,ZH,,(️Ãà Step #5: 🔩,ÃD Step #5: Ã,(X,, Step #5: e7lvAà Step #5: l0 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-c5"] Step #5: Step #5: Running test ["cut", "-f4", "-d,7", "-f4", "-c1", "-f5"] Step #5: === Compare result for: cut ["-f4", "-d,7", "-f4", "-c1", "-f5"] Step #5: Pipe: So🔩,Ãr,s,JW Step #5: 0hIRpCb6,7 Step #5: xIC🧰nwa(,,hgWw2cx,h Step #5: u(🔗🪛haL🔗E,1 Step #5: CHV,1xeyf8l Step #5: 4Mb Step #5: O,,,️BC,l Step #5: cugAi🧰w,tq,Ã((ZÃÃ0 Step #5: lYU,ly3N,( Step #5: nvbeiX, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-d,7", "-f4", "-c1", "-f5"] Step #5: Step #5: Running test ["cut", "-c1", "-d,"] Step #5: === Compare result for: cut ["-c1", "-d,"] Step #5: Pipe: ,xiz,zh Step #5: ,o(V,8 Step #5: ,Ep Step #5: 8DMMP Step #5: Step #5: F(,VZ8🧰qc,🧰OO🪓0, Step #5: H Step #5: 🪛9,h🔩o,RBbf Step #5: Ã1 Step #5: Nc🧰o,fI⚙5,TO Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-d,"] Step #5: Step #5: Running test ["cut", "-c4", "-f2", "-d,", "-b9"] Step #5: === Compare result for: cut ["-c4", "-f2", "-d,", "-b9"] Step #5: Pipe: na🔩,kO1,AE,bTÃTy Step #5: ,IMd🔗V,d,,nN Step #5: Kv,KRQQ,, Step #5: Qngxz,19(,DETr,Ei, Step #5: gky,QTD,s,b3Ci,⚙NDyw Step #5: 9⚙Y,(v🪓,09c, Step #5: O🧰KM🪓,qNKvj, Step #5: E,4,WqS(m(jJ, Step #5: XIx,,h(JÃdHb,w🪓🔩 Step #5: b,gQpy(,6i️kGA8,HlÃ,C( Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c4", "-f2", "-d,", "-b9"] Step #5: Step #5: Running test ["cut", "-c6", "y(biE"] Step #5: === Compare result for: cut ["-c6", "y(biE"] Step #5: Pipe: Z,qXkÃ, Step #5: u, Step #5: , Step #5: g9k8R,,,🪓KS,4 Step #5: 🔗jhAd,,Xi,,à Step #5: y,Ss,L,,H Step #5: 🧰 Step #5: c,mB Step #5: LJnq7rSb,,,V Step #5: TTFXkev,eZ4(1,(pe Step #5: Rust stderr: Step #5: y(biE: No such file or directory Step #5: GNU stderr: Step #5: 'y(biE': No such file or directory Step #5: --- START diff Step #5: -y(biE: No such file or directory Step #5: +'y(biE': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c6", "y(biE"] Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: jdm, Step #5: ,I(,( Step #5: A,3Mnu1jL3,,jx7B3rE⚙🔩 Step #5: hKlBmbZ,,rXJHxFWXT, Step #5: 0R,Z Step #5: 7 Step #5: Ãoys(M,iDYqlgl, Step #5: ,N🪓🔩J4,c,dAP,8B Step #5: ddWQ🔗h,️62Rà Step #5: G,,v,Tgh Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c1", "-d,"] Step #5: === Compare result for: cut ["-c1", "-d,"] Step #5: Pipe: Step #5: 9cj🔩w,8Ã(,qpmM,LVZuÃ2j,GÃIÃx Step #5: 🪓Ã2,daÃ5,dLn Step #5: Nmt7kC,xp6Vy,(,, Step #5: k Step #5: oÃx(I,(C(2nS,( Step #5: m5,nJ,vcyu0Ã, Step #5: lA,18wiP Step #5: 2zRÃWjB🧰,,pJtXU🧰,JldPd,WNoW98QlJ Step #5: UIIMTVb,n,3S,y6r,c Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-d,"] Step #5: Step #5: Running test ["cut", "-c4"] Step #5: === Compare result for: cut ["-c4"] Step #5: Pipe: e,dv3Ã,T, Step #5: Ibl,mQ(L🔗 Step #5: ,,0QC7ÃkÃO,WZ6lhI6🪛Q Step #5: (E,E️(,ÃxY1HM,SglxI,nvPxm Step #5: e,USAlSPz,,OyiL🪓s,( Step #5: , Step #5: d,Xcr9Y,l Step #5: 🪓Ã,96ae🪛🧰 Step #5: ,V( Step #5: jO( Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b8", "-b2"] Step #5: === Compare result for: cut ["-b8", "-b2"] Step #5: Pipe: ,Ã0WÃBs,(((Zk,g Step #5: UMJ(s,(y🪛FOXQ,W(⚙tZ Step #5: 🪓qE28(🔗,,lsS Step #5: 0️ÃP Step #5: bmZ,Yd27, Step #5: M Step #5: Q,P0fx,8yRFxx32 Step #5: ,(n,Ã2K🧰fAJQ,wpÃgL( Step #5: BI Step #5: D,h Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b8", "-b2"] Step #5: Step #5: Running test ["cut", "-f5", "-f4", "-d,C", "-c5"] Step #5: === Compare result for: cut ["-f5", "-f4", "-d,C", "-c5"] Step #5: Pipe: d(aIÃq Step #5: Uu,CG,l🔩 Step #5: ️JZ0A4Y,dGlFOWW,BZN,J,((Xi Step #5: 9️5Cn Step #5: Step #5: Qo6zF,6,(0,U,zu Step #5: lad🔩,Bu,,3🧰🔗 Step #5: Ãj,VOJc8, Step #5: 🔗3Mp,,W,L Step #5: ,19JÃ1 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-f4", "-d,C", "-c5"] Step #5: Step #5: Running test ["cut", "-d,Ã", "-c2"] Step #5: === Compare result for: cut ["-d,Ã", "-c2"] Step #5: Pipe: wF,,Ã2,aHEG Step #5: K Step #5: ikLs2ak1I,,,,4x Step #5: pBkHE0,2rNWFq,t🔩W⚙ Step #5: fÃk,,Ak,FN(RÃq⚙ Step #5: T, Step #5: 38w9🧰, Step #5: bSFiN,js,9L,kfb,T Step #5: Yg,I6 Step #5: J2z,🔩RO,⚙ZnjR(H Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,Ã", "-c2"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: 70,ÃO(wY Step #5: xÃsjMp,uaGm,,s(P🧰1🔩, Step #5: lH(O, Step #5: h,Ã(y,🪓,Jo4x Step #5: g,Im6,🔩RM4,lv🪛4T Step #5: y(,,vk⚙(XRK(, Step #5: epO( Step #5: Ev1,LS,R0,d,LJ Step #5: 1⚙,🧰ÃC,8Ã🪛yF Step #5: gHriB5,,f,,yf0S Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-b3", "-b3", "-d,3"] Step #5: === Compare result for: cut ["-b3", "-b3", "-d,3"] Step #5: Pipe: (,Dp(,Q,🪓,B Step #5: dysjd,wKyd🪓f Step #5: d🧰b,zF🔩QuR,Z Step #5: udcct🔗X,,,E,iX Step #5: fQU,e,9t5️ Step #5: Q,f,,Ã,ZpbaqKkC Step #5: ykSpR⚙,Co,x1QZNÃ(3,cS,x Step #5: ️v,,,🪓IE Step #5: 9oq7w Step #5: ⚙u,FX5Uu,31FMN7,3g🔩( Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b3", "-b3", "-d,3"] Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: a(gEB,BJbloIt,oMufL(7 Step #5: Mz,u🔩wT Step #5: GLn Step #5: a3kah,,,p,(mA Step #5: y Step #5: ,82TrmKÃzg,8t⚙,ZpÃpnFoA🪛 Step #5: AUfÃtd🔗,iGpb,Ãa Step #5: QRTnYSKO,y6️Ã(,U Step #5: 6ÃxpU3, Step #5: C,F, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f1", "-c4"] Step #5: === Compare result for: cut ["-f1", "-c4"] Step #5: Pipe: a,ucuNl Step #5: d Step #5: 🪛, Step #5: a🪓,dWAh,,n3🔩wWbW, Step #5: ,🪛UFOX,,, Step #5: Step #5: ,Jw,P9,inXà Step #5: ,b9🔗 Step #5: nKdH🔩Q,H,o️,S Step #5: ,4Dr5( Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-c4"] Step #5: Step #5: Running test ["cut", "-f5", "-f1"] Step #5: === Compare result for: cut ["-f5", "-f1"] Step #5: Pipe: I1,,((,W Step #5: NVgH(88Qm,I,b, Step #5: ,a5,H Step #5: V,nÃTÃ,woBJT, Step #5: ,xnÃn🔩A1,rX1q,,3️MM🔗 Step #5: ,,🔗AW Step #5: r,Ã🔗QjO🪛5 Step #5: (bÃE,G,w🔗kvpEt Step #5: aP Step #5: 🧰nC,,L3 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-f1"] Step #5: Step #5: Running test ["cut", "-d,", "-c5", "-f3", "-d,", "-f3"] Step #5: === Compare result for: cut ["-d,", "-c5", "-f3", "-d,", "-f3"] Step #5: Pipe: EÃ🪛W,sv(K6Dlr,n0l Step #5: lKÃ46,qjNQ9b🪛, Step #5: i6v,0( Step #5: ,L,,(🪛 Step #5: Js1o(🧰🪛 Step #5: 9mscGHB,iÃM Step #5: ,(à Step #5: h3QJ, Step #5: (,UeE,g Step #5: mK,,UiT Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c5", "-f3", "-d,", "-f3"] Step #5: Step #5: Running test ["cut", "-d,", "u7zql🪛⚙Z9L", "Ã", "gchH", "HJ0"] Step #5: === Compare result for: cut ["-d,", "u7zql🪛⚙Z9L", "Ã", "gchH", "HJ0"] Step #5: Pipe: 3H,wM🪛 Step #5: ,5n1,zK Step #5: J3h,,6 Step #5: 🪓fI,lXnEs,Ly, Step #5: ,SP,G, Step #5: 9kJà Step #5: 8Ã,,D Step #5: ⚙Beà Step #5: ÃcFHaV🧰YÃ,5DIW,XMr,🪛twa Step #5: Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "u7zql🪛⚙Z9L", "Ã", "gchH", "HJ0"] Step #5: Step #5: Running test ["cut", "-f2", "-b5"] Step #5: === Compare result for: cut ["-f2", "-b5"] Step #5: Pipe: ,VF,W,️A🪛 Step #5: ,7ygz,LTS🔗 Step #5: Z,⚙l( Step #5: ️2AIK,, Step #5: CW8q,Ã,x,u8VO,IxVRAS⚙⚙a Step #5: c🪛,jMq,y Step #5: jc(Is(J,3A🧰M,️️fCORV06 Step #5: Jx94AÃs9,4n🔩(b(h🪓E,d4q3wp Step #5: Z0zq1,️gA Step #5: 2OR Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f2", "-b5"] Step #5: Step #5: Running test ["cut", "-d,", "-d,N", "-c3", "-c2"] Step #5: === Compare result for: cut ["-d,", "-d,N", "-c3", "-c2"] Step #5: Pipe: ,TrbQA🪛(,J🔗 Step #5: zv,Dc⚙6 Step #5: 4,r⚙W2P8c,jus3,2H Step #5: ,QÃG⚙Et Step #5: ,BW,R(,HEl🔩Dz,Mfzj1 Step #5: Ãk,FZY Step #5: ÃBLac,YC(,ÃwK5 Step #5: F59SxV,0t,bo Step #5: 🔗,m4,eu, Step #5: BÃI7mkW Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,N", "-c3", "-c2"] Step #5: Step #5: Running test ["cut", "UDo5ycagYcÃ"] Step #5: === Compare result for: cut ["UDo5ycagYcÃ"] Step #5: Pipe: X,e🧰ICF Step #5: ,,d(SnNÃ1WJ Step #5: 🪓🧰6,6(i4ÃP,8I8🪓 Step #5: DKNÃZ,gP,h,🧰(, Step #5: ,⚙Q((b,l0vz,, Step #5: UYde3 Step #5: w Step #5: Z,🪓c,70(B(J Step #5: 7x,l🧰Ãà Step #5: ,hS3,4Pà Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["UDo5ycagYcÃ"] Step #5: Step #5: Running test ["cut", "-d,", "-d,"] Step #5: === Compare result for: cut ["-d,", "-d,"] Step #5: Pipe: l,J,J1f, Step #5: 7,🔩lDOQn,,0v Step #5: 4iT Step #5: Ak,49 Step #5: bos8iUy🪓,ae Step #5: N🔩,ÃWi,, Step #5: AV3oML,Yp,XD,EsGU(️,W7ÃK️U0y( Step #5: tlq,Ã,,(H4 Step #5: , Step #5: Vx,xCm️B Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,"] Step #5: Step #5: Running test ["cut", "-c3", "-d,L", "-b2", "-d,k"] Step #5: === Compare result for: cut ["-c3", "-d,L", "-b2", "-d,k"] Step #5: Pipe: Step #5: (NTY,xl🔗, Step #5: (C,Ã, Step #5: Ã,bÃw Step #5: AWPF,d,,vc,oWwJ Step #5: ⚙,🪓U Step #5: ,(🔗,9,F7Yt, Step #5: b🔩L🪛ecdL Step #5: CoH(dah Step #5: ÃyUIW🪓🪛,u Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-d,L", "-b2", "-d,k"] Step #5: Step #5: Running test ["cut", "-d,z", "-b3", "-b1", "-d,z"] Step #5: === Compare result for: cut ["-d,z", "-b3", "-b1", "-d,z"] Step #5: Pipe: I🪛E,p,rO51(🧰, Step #5: Z🔗 Step #5: DjPY,tyZcVk2,R4, Step #5: (,GL1🧰svp8B,hFO(7Hg,, Step #5: 🧰lA,Z Step #5: 2Gi,b Step #5: b Step #5: ysÃT,⚙iap,,L,L Step #5: ,,🔩5Z,r Step #5: D Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,z", "-b3", "-b1", "-d,z"] Step #5: Step #5: Running test ["cut", "-c1", "-c9", "-c6", "-c6", "WR⚙Jvn⚙e"] Step #5: === Compare result for: cut ["-c1", "-c9", "-c6", "-c6", "WR⚙Jvn⚙e"] Step #5: Pipe: EpF,J2NzR Step #5: (tHg, Step #5: nozv,a2🧰2,🧰BNZk8a Step #5: ID8,NÃ🔗,Tc4,p(, Step #5: 🪓🪛na,🪛(eTK Step #5: 2(w Step #5: ,uM, Step #5: ReÃ,f️3Pa,m2,⚙AQj(KP,(Ã5 Step #5: à Step #5: W,v2,K,Yq Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-c9", "-c6", "-c6", "WR⚙Jvn⚙e"] Step #5: Step #5: Running test ["cut", "-d,", "oÃSKÃ🪓Ã(🧰", "-f2", "-f1"] Step #5: === Compare result for: cut ["-d,", "oÃSKÃ🪓Ã(🧰", "-f2", "-f1"] Step #5: Pipe: 8 Step #5: 4VF,Z(AY,iZC,kB8,3q Step #5: ,lGZmÃ,a7rFmE,Ã,X Step #5: Ã,Q3d,k🧰,P Step #5: W,0Dgvj55pFk,Tlk9b(,w,VT0 Step #5: FmY🪓HXB🪓,,, Step #5: e7r,,,pp(aCLÃrq(,sV Step #5: FS8, Step #5: (, Step #5: V️Ià Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "oÃSKÃ🪓Ã(🧰", "-f2", "-f1"] Step #5: Step #5: Running test ["cut", "-c9", "-b3", "ZÃM3🔩g🔩5Dia", "-d,H"] Step #5: === Compare result for: cut ["-c9", "-b3", "ZÃM3🔩g🔩5Dia", "-d,H"] Step #5: Pipe: 7pvd0,Ã9ETD,⚙d,uxw3 Step #5: Step #5: D3🧰,9l,0UsG,fU(( Step #5: 🪓RRIKrX,Ãa,🪛 Step #5: a3RU⚙(,nVpT6ÃÃ,e2I Step #5: Xr,welQ🧰 Step #5: (🧰, Step #5: Gxt,K🪛,WÃ1a Step #5: o,Ã3lX,🪓j🔗S,nszB2 Step #5: TS🪛,️,HOM, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c9", "-b3", "ZÃM3🔩g🔩5Dia", "-d,H"] Step #5: Step #5: Running test ["cut", "-f1", "-d,Ã", "-b8"] Step #5: === Compare result for: cut ["-f1", "-d,Ã", "-b8"] Step #5: Pipe: 70I3W🔩,5l,,dj Step #5: X,️,🧰z Step #5: zyM,(V(d,jF,k Step #5: t,Z Step #5: r,Us,U🪛,wÃ,G Step #5: gOBHFC(Ã, Step #5: H3i(O,mjXSz🔗8,,,WN(5LGà Step #5: bÃ,,,Abb,ÃE Step #5: 🪛,HvDOn,k, Step #5: R🪛Kf3,D🧰t⚙zeÃ,NJ,⚙ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-d,Ã", "-b8"] Step #5: Step #5: Running test ["cut", "-f3", "-d,", "-c1", "BO"] Step #5: === Compare result for: cut ["-f3", "-d,", "-c1", "BO"] Step #5: Pipe: ,,gB Step #5: T🧰Z Step #5: CÃC,🧰3m🪛z,9,X3 Step #5: nZxAal🪛🔗, Step #5: ,yzA Step #5: FÃJpsSy,,f️,🪓l Step #5: ,e,🧰El🧰p4,xkm Step #5: D,2,c8,9iqÃy, Step #5: GXb🪓,D3🧰Y Step #5: 4🔗🔩M,9NkPd,,T Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-d,", "-c1", "BO"] Step #5: Step #5: Running test ["cut", "-c1"] Step #5: === Compare result for: cut ["-c1"] Step #5: Pipe: Uk1 Step #5: bd,u01F5🔩L6,bJ6 Step #5: q59o,j🔗,A(, Step #5: t, Step #5: Bwpjf,zqnA,D Step #5: I Step #5: Z9sKn Step #5: O,(N⚙EW,a,QvZjT1ynq,fHd((à Step #5: ,6,,37w,(xApiL Step #5: 9Ihqm,(nc🧰,V7🧰 Step #5: === OK Same behavior Step #5: Step #5: #128 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-d,N", "Q9RZY1l5D", "-b3", "-d,", "-d,T", "-d,"] Step #5: === Compare result for: cut ["-d,N", "Q9RZY1l5D", "-b3", "-d,", "-d,T", "-d,"] Step #5: Pipe: V️,Qu,r, Step #5: Yp,9z🔩⚙,z, Step #5: 72KIh🪛,R,v🪛ÃLw,(️64tnxr,65jQKyJ Step #5: Xah,SG,(d,xER,EMk Step #5: y,HHsFS,yÃ(,i Step #5: ⚙p⚙🔗Bg49 Step #5: oÃZ,ÃK,🪓Kg Step #5: Pc,Z(8ÃC,XEYX,11, Step #5: P1uKJv Step #5: CPKm006 Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,N", "Q9RZY1l5D", "-b3", "-d,", "-d,T", "-d,"] Step #5: Step #5: Running test ["cut", "-b1"] Step #5: === Compare result for: cut ["-b1"] Step #5: Pipe: ihiF,hjHAn,A0cN,vEÃL3,in0p( Step #5: hS,,EQkj1,🧰p4cr,i Step #5: gxw,C,,🔗jH🔗ÃpT,p7l Step #5: kg🪓UaB,(V(a,T Step #5: bÃiOxD🔗UkE,,J(,BAOW,E Step #5: (4q Step #5: a( Step #5: ,IaY Step #5: xV,Ã,eZt5🔩6r Step #5: 1p,NiÃHVYRP Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c10", "-d,🧰"] Step #5: === Compare result for: cut ["-c10", "-d,🧰"] Step #5: Pipe: t Step #5: rP,7NK Step #5: Step #5: CCd,eB Step #5: ,vyÃÃhC,LG3z9,3sr Step #5: J4ÃtaW2,5sus,à Step #5: UoS Step #5: YÃR,d,yna️u,8 Step #5: l️️8w9iU,1,PW,1VV6M8b🪛f,à Step #5: Ã,g9🪛s🔩 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-d,🧰"] Step #5: Step #5: Running test ["cut", "-f2", "\u{fe0f}wld22C(eI(fk", "-f2", "-f3", "-d,B"] Step #5: === Compare result for: cut ["-f2", "\u{fe0f}wld22C(eI(fk", "-f2", "-f3", "-d,B"] Step #5: Pipe: ÃHEGT,vlxx,COTj,j7(, Step #5: J,🪛tYIHl78,qP(n7 Step #5: Step #5: Z6,ÃA Step #5: ,🔩S Step #5: ,JqI Step #5: (R🪓z,9t,VMÃ,8rb,3Xdp Step #5: ,(vkgkR Step #5: ️k(,,Ef,RJ1hW,UwZGV Step #5: GX,pE,,6QO,E Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f2", "\u{fe0f}wld22C(eI(fk", "-f2", "-f3", "-d,B"] Step #5: Step #5: Running test ["cut", "-b6", "-f1", "-c10", "-c3"] Step #5: === Compare result for: cut ["-b6", "-f1", "-c10", "-c3"] Step #5: Pipe: dVH3(n Step #5: ,Gvgh1D,JIW8 Step #5: 7🪛2F,UaBgpicIC,🪓Z Step #5: (ÃmdH🪓X,p,rt,swLd,🪓à Step #5: s,asiÃ,x3v(0,GGF5N️ Step #5: ,rhmG,M2w,ur,🧰D Step #5: 4mW5ejgf0b Step #5: Cf,4,lc Step #5: ,,n5,r,SÃhgA🔩🔗 Step #5: 8,l4🔗m🔩, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b6", "-f1", "-c10", "-c3"] Step #5: Step #5: Running test ["cut", "-c9", "-c10", "-c1", "-c8"] Step #5: === Compare result for: cut ["-c9", "-c10", "-c1", "-c8"] Step #5: Pipe: 🪓n,Ãg8 Step #5: ,Ns Step #5: kQ(qF0,,dUdgXl, Step #5: iga,,oZH,P,à Step #5: ,(q,i,1z🔗Ã🧰PaV Step #5: l,,W6,,BY Step #5: U,d🪛A,AB Step #5: JPx0Ig,e,m8T,sg,XuM Step #5: ,️O9🪓R🪛,🪓(F,,dQ Step #5: V Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c9", "-c10", "-c1", "-c8"] Step #5: Step #5: Running test ["cut", "-b10", "-d,(", "-f2", "-b4"] Step #5: === Compare result for: cut ["-b10", "-d,(", "-f2", "-b4"] Step #5: Pipe: Step #5: M Step #5: DKNh Step #5: se Step #5: (jUb,u Step #5: 6,l Step #5: Jl,d,,gbM Step #5: 🔗yEQ Step #5: ,vVq9(,djpD,(DgFO(🔩Qve Step #5: X🔩Ã1 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b10", "-d,(", "-f2", "-b4"] Step #5: Step #5: Running test ["cut", "-c8"] Step #5: === Compare result for: cut ["-c8"] Step #5: Pipe: ,YTB,Xmc🔩3fg,Hhmo0(Ãe,04z Step #5: 🪓 Step #5: f⚙y,jvÃp,X3🔗2r,,lY Step #5: Mz(u,kV2 Step #5: t,R(🔗 Step #5: OPDS,SO0,(rX Step #5: yF9,vN(XW,🪛MsE,1oRlEO92,o Step #5: ci,BcvÃ7,or,Q1O4 Step #5: ktA9b(, Step #5: 🔩,2 Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c8", "-f1", "-f1", "-c6"] Step #5: === Compare result for: cut ["-c8", "-f1", "-f1", "-c6"] Step #5: Pipe: t,x3evtH Step #5: z,BD,DrN(k Step #5: ,2 Step #5: N,BiiQ Step #5: Step #5: ,🔩9c,🧰ÃI(sN🪛,,OÃZHhu⚙ Step #5: 9, Step #5: XrN🧰wNP( Step #5: (6,i9c2ÃKHF,7e🧰,d,a1x Step #5: CÃ,Ã(5MM,z,s3m,aH Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c8", "-f1", "-f1", "-c6"] Step #5: Step #5: Running test ["cut", "-c10", "-c10", "-b7"] Step #5: === Compare result for: cut ["-c10", "-c10", "-b7"] Step #5: Pipe: 🪛r,Ã,ba Step #5: RNh,fp,dXh🪓X,Ãk,x(🔩Zp Step #5: W4Z🔩 Step #5: 🪓rqÃy Step #5: R1vuOEJ,🧰L,,V⚙🪛YÃ,z Step #5: eR,NLP,e,🪓tÃs,49dL Step #5: o,BÃ🔩O,bZ,,🪓9AcWC(2 Step #5: ️,B9F,8 Step #5: wRoTP Step #5: J( Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-c10", "-b7"] Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: (R61iH, Step #5: zX,Wqb10aDH Step #5: HlC️a,🪛🔩mYYÃ, Step #5: p,,r Step #5: mjSuE Step #5: n,wvN,6 Step #5: T,FAÃd,(yR🪛h,n,xCHYkXej🪛 Step #5: (,qra,UE Step #5: HoÃj7X,gs,3E,️ÃdOb,Aco🪓D Step #5: Ã,C61y9h, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,", "-c5", "-f5"] Step #5: === Compare result for: cut ["-d,", "-c5", "-f5"] Step #5: Pipe: ,Q(,rJC6🔩Ã🔩z,V🪓 Step #5: jm(️,nW,B,🔩C3dI4,A77GPÃz Step #5: MCYLIt,qÃ53,5,f,suv Step #5: 🔩z(,G️2⚙iD,ÃrdN7,Umd4l,qB⚙ Step #5: k8Ã0D,4m(u74iW Step #5: dYXPwW Step #5: (Ã,ÃNKToRk,YlOQL,T Step #5: FHb⚙D5g7E,(9 Step #5: YAa🧰y4, Step #5: z,VxJP5W,🪓Zga4🧰🧰 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c5", "-f5"] Step #5: Step #5: Running test ["cut", "-b5", "-c2", "-f2", "g", "-b5", "-d,🔗"] Step #5: === Compare result for: cut ["-b5", "-c2", "-f2", "g", "-b5", "-d,🔗"] Step #5: Pipe: ,wL,D,jR974C Step #5: S Step #5: TRP(NL,,xzh(ÃJÃ,YI Step #5: K🪓j9t,8s🪛btsHE Step #5: ,hut,Ã🔩o, Step #5: Step #5: ,🧰,CNwqe7🪓,k, Step #5: Omk,,FXf8,⚙(82jJ Step #5: (0,QM,x, Step #5: rJ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b5", "-c2", "-f2", "g", "-b5", "-d,🔗"] Step #5: Step #5: Running test ["cut", "-c3"] Step #5: === Compare result for: cut ["-c3"] Step #5: Pipe: 2 Step #5: f,X🧰,Bc(🧰 Step #5: P,,G7,,e Step #5: 🧰f Step #5: OIbOXEk, Step #5: 🪛LE,XzWB7w,HB🧰Ghid Step #5: 0TNPyV,XY,dRro Step #5: ,qr,8🔗5à Step #5: 1🪛(N,🔩ÃLOÃO85,I,Kh(Ã3f(o, Step #5: 7E,W,7o Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b2", "-d,", "-c4", "-c6"] Step #5: === Compare result for: cut ["-b2", "-d,", "-c4", "-c6"] Step #5: Pipe: Ã🪓,2rPR,🔩0ÃTycXV,Ãd Step #5: AÃm,sV,mY Step #5: 4(82xf,N(7p🔗, Step #5: 3S,io4,Gs,2Gu️ Step #5: ,3,(6,, Step #5: ,,rMC2yÃ,mAl,nTCr Step #5: 🔩VM,Ã,HvCOH Step #5: ub(KQ Step #5: X,00🪛wLÃa0 Step #5: P6v,B8W Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b2", "-d,", "-c4", "-c6"] Step #5: Step #5: Running test ["cut", "-c4"] Step #5: === Compare result for: cut ["-c4"] Step #5: Pipe: j6cf Step #5: ,3,,⚙K2FP,XLR️à Step #5: 2,,nSmxXW, Step #5: 🧰,W,D,Ae Step #5: ,8,2QEuHP,L,i7ada Step #5: dn14🪓yM,Bv(B,,f(G( Step #5: 2qu Step #5: , Step #5: I,V,g Step #5: 6,Lt1 Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b10", "-c5"] Step #5: === Compare result for: cut ["-b10", "-c5"] Step #5: Pipe: 8Ãn️mI Step #5: h🪛Bd26gV Step #5: 7Dk,9k Step #5: H,1,Rufq,,(v1ox Step #5: ,w,Q0Lm🪛T Step #5: Dv(,BjCzJ,041🪛,🪓o,RÃN0U Step #5: O,v Step #5: (sgJ🪛à Step #5: Ãal,1P(, Step #5: (🧰qt Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b10", "-c5"] Step #5: Step #5: Running test ["cut", "-c10", "-f1", "-b2", "-b10", "-b10", "-d,t"] Step #5: === Compare result for: cut ["-c10", "-f1", "-b2", "-b10", "-b10", "-d,t"] Step #5: Pipe: 🪛,,g,Zq Step #5: wC3,,v,Ã(XWBcXgU,cw Step #5: kp Step #5: 4A(d(,R,ÃR️ Step #5: ZgQ,Xf,L1p Step #5: (P(a5c⚙Ã,⚙0gr,VmWGQ((,(l2E🪛,L Step #5: Dr,nS(E3,DS5D,ZOÃ🔗H Step #5: ,Ãf,3b0 Step #5: xNBJtus,Y,,0N0Dl,D(RO Step #5: vY🧰0V,,Iy68T,🪛B,zt Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-f1", "-b2", "-b10", "-b10", "-d,t"] Step #5: Step #5: Running test ["cut", "-c1", "-b2", "-d,(", "hk", "-f1", "-d,"] Step #5: === Compare result for: cut ["-c1", "-b2", "-d,(", "hk", "-f1", "-d,"] Step #5: Pipe: ÃK, Step #5: v,🪛,(FTST Step #5: 6s️rEdhSU Step #5: 9N,CH(ne Step #5: ,tvFWd77, Step #5: Q,,JzVà Step #5: (,CAMÃ(fL Step #5: 4j3ÃmÃ9, Step #5: s Step #5: ZbÃWh Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-b2", "-d,(", "hk", "-f1", "-d,"] Step #5: Step #5: Running test ["cut", "-d,P"] Step #5: === Compare result for: cut ["-d,P"] Step #5: Pipe: 5Ã,2🪛Cbc,m,, Step #5: 8,UvF29DR,M, Step #5: ,,bÃ,1t6 Step #5: ÃYsN,w🪓l,M7ÃPV️(lVL,4,🧰 Step #5: ,sf🔗,4t(X Step #5: q️,,hHbuy Step #5: bzk🪛,U️ Step #5: f,️qA,⚙a81bJ,(pJfD, Step #5: (SmgÃ,O,suZÃlL⚙,,UAVMGm Step #5: ,Y,,,🪛v8TP Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,P"] Step #5: Step #5: Running test ["cut", "-f1", "-d,"] Step #5: === Compare result for: cut ["-f1", "-d,"] Step #5: Pipe: uXKU,🧰,vV,jO Step #5: M,,2,y🪓usbo Step #5: 6 Step #5: w,de,,mx Step #5: Ã6T5 Step #5: Step #5: ️y,Else,y🔗3Ã🪓 Step #5: mmsyl,JÃ,🔩mpg3 Step #5: iW🪓Ã(1(🔗,5,, Step #5: ÃÃn6c,v Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "E", "-c8", "-b4", "-b10"] Step #5: === Compare result for: cut ["E", "-c8", "-b4", "-b10"] Step #5: Pipe: WfiF🔩X,V,,🔗OCL4IhtfM, Step #5: D,Zg((IUsMQ,MaBsE,F🧰,BQ Step #5: W(zr,,UJ3l Step #5: ️🔗 Step #5: c,e,🪛9 Step #5: hRlÃ(pUdÃ, Step #5: ,4,5P8, Step #5: 6,Ã,S,Z Step #5: YE🪓ho,,5⚙g4I Step #5: T,fJ,E,jp,aZrm Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["E", "-c8", "-b4", "-b10"] Step #5: Step #5: Running test ["cut", "-d,", "-d,"] Step #5: === Compare result for: cut ["-d,", "-d,"] Step #5: Pipe: 🪛Y88🔗 Step #5: d️5,🪛yÃs Step #5: U,KaBN,H Step #5: e,(2️,j Step #5: hB🪛,f,ÃN,WK,E43b Step #5: X,Ã⚙🪓 Step #5: Step #5: KwQ,🪓(z Step #5: p7,hq(🪓oIz,lI,N Step #5: (,q🪛m, Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,"] Step #5: Step #5: Running test ["cut", "-f3", "-d,x"] Step #5: === Compare result for: cut ["-f3", "-d,x"] Step #5: Pipe: oO,gPÃ,Ãy,(xIn8 Step #5: 6z🧰1🧰Ry️Wl,🪓3N5,Yi️,🧰RKI Step #5: 6,🧰VK,x,ÃÃ,55ySsM🪓l Step #5: DEEhl14oH,⚙️Z,YWu🪓 Step #5: cs Step #5: ufÃygO(j9u, Step #5: 🧰r(mz🔩oÃA Step #5: Yf,3t,kvVgv Step #5: (,Ã6⚙6K,️A,AdOWX9,4HHG Step #5: zEos25,kT,3R,Sg4, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-d,x"] Step #5: Step #5: Running test ["cut", "-b5", "-d,🔗", "-b1", "-b6"] Step #5: === Compare result for: cut ["-b5", "-d,🔗", "-b1", "-b6"] Step #5: Pipe: , Step #5: AmG,,s Step #5: c(,nwnOW Step #5: ,,,WuBO,M Step #5: (FZHWmaKt,vBL Step #5: ,qÃOBLO,3E,ZJ, Step #5: o,N Step #5: t,,Jga,0eH Step #5: sChYoTY,fu,d🔩15ÃH,nC5 Step #5: 3N9,L7ar2K0 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b5", "-d,🔗", "-b1", "-b6"] Step #5: Step #5: Running test ["cut", "-f3", "CcFZV9vId🧰pn(", "-f3", "-b10", "-b5"] Step #5: === Compare result for: cut ["-f3", "CcFZV9vId🧰pn(", "-f3", "-b10", "-b5"] Step #5: Pipe: 6vGDt9q,p,QiÃxn6,ià Step #5: ,eU,n🔗🔗x,qOEn3 Step #5: Jm2b Step #5: 3G(,D1ot,Zjoh2🔗Mk Step #5: 2gN,🪓Euw,🔗🪛SmriHm,Y, Step #5: 5D⚙9 Step #5: D0,7,,gN⚙aNVyx,36yz Step #5: NNKQf,,h Step #5: ÃÃCx3NISz,e,OXiÃ,,d2à Step #5: i(IwAL,13gAG Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "CcFZV9vId🧰pn(", "-f3", "-b10", "-b5"] Step #5: Step #5: Running test ["cut", "-f3", "-f5", "-f4"] Step #5: === Compare result for: cut ["-f3", "-f5", "-f4"] Step #5: Pipe: VXW5yi Step #5: hXd2lsE🔩Ã,C🪓g🧰,n Step #5: H,EÃ,(3z,VQ Step #5: O,ÃF,c,g,3M Step #5: Xznd26O🧰, Step #5: Q,q,( Step #5: Step #5: ,U3g,que Step #5: 0(, Step #5: WUJx0,I3sHc Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-f5", "-f4"] Step #5: Step #5: Running test ["cut", "-c4", "-d,Ã"] Step #5: === Compare result for: cut ["-c4", "-d,Ã"] Step #5: Pipe: g🔗JmDf,P,,oyMG(X Step #5: 1vozwo,e⚙F🪛z,DÃ,🧰️u Step #5: (WTÃr,gO Step #5: ,ÃU,Rn0 Step #5: ⚙, Step #5: ,8ba5d,T( Step #5: g,d,🪓Et4f2Sc,Ã75🪛v Step #5: X,2,Ã(,wEH Step #5: i,hj,d4Ghx8,à Step #5: ,m6(Ã,Ã4El,QDQ1ÃNQz🪓, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c4", "-d,Ã"] Step #5: Step #5: Running test ["cut", "-d,", "-d,", "bYXr", "-b1"] Step #5: === Compare result for: cut ["-d,", "-d,", "bYXr", "-b1"] Step #5: Pipe: ⚙5udU🔗z,BZs(on,aJknopf Step #5: ,uP,N🔩, Step #5: ,JÃITciIY,wÃÃwQR,WAEd⚙,EK0 Step #5: ÃB⚙(,Kd,,(,⚙🪛🔗1D( Step #5: zÃ64,z8QTEOV🪓,(,I🧰l,y Step #5: x(I Step #5: F,,FeMfb,,6hzTxNHW Step #5: 🪛alDyZk,,(cSXg,Ã,wL🔩L8Ã5 Step #5: ZJ,w3 Step #5: yUVzR4GZ Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,", "bYXr", "-b1"] Step #5: Step #5: Running test ["cut", "-d,6"] Step #5: === Compare result for: cut ["-d,6"] Step #5: Pipe: k Step #5: RSI Step #5: BXf,zRj Step #5: W8,m Step #5: Ãwu,VM9,h,,ta Step #5: 5 Step #5: Bv,z, Step #5: 3KY, Step #5: Dgq Step #5: JT,(ÃAh,B🔩🪓7⚙ÃjB,n Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,6"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: ,,iaFy Step #5: ,1,3i🪓zÃ,f3V🪓🔩,cOD Step #5: 2Ã,2W Step #5: ,pf🪛CgJv Step #5: QsYb🔩ZC,6ÃL Step #5: ,HCCTJ,️vÃK⚙h,🔩Ã2Ti🔗 Step #5: ,,, Step #5: u9 Step #5: OqOGO079,zl,,8u1F7up,U🪓 Step #5: x,lW(,U9🪓W(6Cv Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-d,N", "-b6", "-c1"] Step #5: === Compare result for: cut ["-d,N", "-b6", "-c1"] Step #5: Pipe: u(9,n⚙,à Step #5: xcbfvgcqN,,,G8, Step #5: a,D(,R,fte,ly Step #5: ,v Step #5: ,0 Step #5: sGd(,4 Step #5: Ro Step #5: OÃ,Ã,x,xl,🪛b Step #5: G,sG,JaJ3,, Step #5: 5️QZ(yfà Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,N", "-b6", "-c1"] Step #5: Step #5: Running test ["cut", "-c8", "-f3", "G", "-b10", "-c1"] Step #5: === Compare result for: cut ["-c8", "-f3", "G", "-b10", "-c1"] Step #5: Pipe: r,G2🪓 Step #5: GZB,tc,DB,JVUVK Step #5: r,,I🧰,nz1️,TzGdRÃNIm Step #5: 7,z,Ps9iX Step #5: ,7🪓,SM Step #5: Y Step #5: qcOl Step #5: X(🧰,1n,(( Step #5: s,,N,V Step #5: ,PH(P️Cv,,ZrpVjh,F Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c8", "-f3", "G", "-b10", "-c1"] Step #5: Step #5: Running test ["cut", "-d,", "-b3", "-b8"] Step #5: === Compare result for: cut ["-d,", "-b3", "-b8"] Step #5: Pipe: ((o9Ã,,🔩(,4,JG Step #5: kDK Step #5: nOn🧰,IkVuB Step #5: 42(,WtS6e,ÃLÃT,z Step #5: 29MP,ÃAq7Z,, Step #5: gY,,GG30xGaf🪓,(dFRzB Step #5: G,tX, Step #5: Ã,EB,O,w Step #5: ,,,,WQ🪓CkWD0B Step #5: 🔗,Bi Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-b3", "-b8"] Step #5: Step #5: Running test ["cut", "-c1", "-d,W", "-b9"] Step #5: === Compare result for: cut ["-c1", "-d,W", "-b9"] Step #5: Pipe: ⚙,tnRFÃ,((AXTv1D,,Ã5(r Step #5: ,MH,Ga,iT Step #5: gw Step #5: j,,ryk🧰JM2p Step #5: 24em,i,f Step #5: w🔩,HX️,🧰,z,v1s Step #5: dqswX3d,,Q6(Z,d🔗z2,UDHC Step #5: 🔗aQ(T9,,Um,tf, Step #5: W🔩🔩,JNGK2YpVh,9 Step #5: mvk,N,UetKF,07jIr,4w6z5 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-d,W", "-b9"] Step #5: Step #5: Running test ["cut", "-b2", "-c8"] Step #5: === Compare result for: cut ["-b2", "-c8"] Step #5: Pipe: 3xQu9fn,o,⚙r, Step #5: BOIÃ(k3,(CTlABY🪛(,️Ma Step #5: ÃÃf,(VÃd8,4NUkh,eg0Mhyo Step #5: RAÃIN4B,k6T6YjlqOÃ,, Step #5: r🪓,ZdY🪓SHv Step #5: RB9️B,,XvUap5eh, Step #5: ,,, Step #5: k9eY,iqMvCn Step #5: FaÃkÃi(Q,MxV Step #5: 8,DP Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b2", "-c8"] Step #5: Step #5: Running test ["cut", "8S", "-d,", "-f5", "-d,n"] Step #5: === Compare result for: cut ["8S", "-d,", "-f5", "-d,n"] Step #5: Pipe: oy🧰x🧰f,🪛h🪓x Step #5: ,F⚙ Step #5: KV Step #5: J, Step #5: 🔩,AV🧰r,Qq,Ec, Step #5: s🧰(y(URt,,RW,1ÃuJ Step #5: (🔗 Step #5: Zc79bK,Gx Step #5: av,(nP(fMfT🪛,t🪓,(🪛cf Step #5: Ã,fN🪓ÃxÃ, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["8S", "-d,", "-f5", "-d,n"] Step #5: Step #5: Running test ["cut", "-c1", "-d,z"] Step #5: === Compare result for: cut ["-c1", "-d,z"] Step #5: Pipe: Q🧰EU,3C(0WÃqB,Ãy2Jz8,t, Step #5: 6s,a,d,Ln7p Step #5: D🪓, Step #5: B Step #5: CHdv️fq Step #5: , Step #5: RU Step #5: ZA(9P🔩5 Step #5: 0j Step #5: 🔩0v,3(Z Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-d,z"] Step #5: Step #5: Running test ["cut", "-b1", "AG", "-f2", "-d,"] Step #5: === Compare result for: cut ["-b1", "AG", "-f2", "-d,"] Step #5: Pipe: 🧰Ce,XÃ⚙xJxIÃ,AyIVÃicPe,ÃH Step #5: (VA,LrHTd,CnQw,🔗ÃXp Step #5: e(o,nXnnE🔗,ÃaLzMÃÃÃr2,Y Step #5: b,Y🔩VÃ0ÃE,,2eIvg,Cà Step #5: ni,🧰rXR8🪛,qr,lS,FA Step #5: 🪓,ÃA,R🪓cf01 Step #5: 🧰🔩,yV,ÃQgDLa⚙c🪓 Step #5: wNnf5,ZLsU6,uBfp1L,K🧰Ã8B,8 Step #5: (⚙0,I,G,n(Sà Step #5: ,,l🔩Vexa Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b1", "AG", "-f2", "-d,"] Step #5: Step #5: Running test ["cut", "-d,", "-f5", "-f5", "-c9", "Ub⚙CYC4C5ewD🔗r4"] Step #5: === Compare result for: cut ["-d,", "-f5", "-f5", "-c9", "Ub⚙CYC4C5ewD🔗r4"] Step #5: Pipe: lR,CyH,,zdMT(D Step #5: T4,6DD,j,IyRWXT Step #5: Fsd,F,N Step #5: , Step #5: S🪛n,🧰1🪓,Ie3G Step #5: wÃ,,R(fu Step #5: P0 Step #5: , Step #5: ,zfÃ(,RÃF,xw,dYr5wg Step #5: GLq7aaÃX, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-f5", "-f5", "-c9", "Ub⚙CYC4C5ewD🔗r4"] Step #5: Step #5: Running test ["cut", "-d,S", "-f5", "🪛jCFV", "-b2"] Step #5: === Compare result for: cut ["-d,S", "-f5", "🪛jCFV", "-b2"] Step #5: Pipe: 🪓m5,🪛EN,4i2, Step #5: Qy🔩 Step #5: ,WÃ,(n️🪛u,QM,Ly9 Step #5: C🔗FÃ,p,t Step #5: ,nv Step #5: boh🪓,Hqq, Step #5: KJTJjgvU,x(,GX,,3Ig53a Step #5: ,8⚙(B69,bO,H4U0 Step #5: ,Ã2LE,D Step #5: ,vb,🧰,P⚙ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,S", "-f5", "🪛jCFV", "-b2"] Step #5: Step #5: Running test ["cut", "-c6", "-c8", "-f4", "-c3", "-f3"] Step #5: === Compare result for: cut ["-c6", "-c8", "-f4", "-c3", "-f3"] Step #5: Pipe: ,kcw,,️, Step #5: zVÃ,,c, Step #5: 0Ãn, Step #5: 🧰TOj,A,🪛🔩🔗dÃ,,Wt Step #5: ,sJL(🔩w🔩Y,H8 Step #5: fjJm6W,a,🪛,R🪓wmr Step #5: ÃÃtZLynT,🔗Bc,YI,Qrioq Step #5: z Step #5: x3🔩,Y,AV🧰,2 Step #5: PwOH🧰,(hi,lHl8,,aEb Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c6", "-c8", "-f4", "-c3", "-f3"] Step #5: Step #5: Running test ["cut", "-c5", "-d,e"] Step #5: === Compare result for: cut ["-c5", "-d,e"] Step #5: Pipe: 9fw3,🪓g,OOTR,🔩ZKv🧰w🧰weK, Step #5: Step #5: O0,,TVSU5Q Step #5: oI,LHu,2,9ÃgL8l,🪓 Step #5: ,Ã,Gnq(ÃÃl,m5, Step #5: f Step #5: (,,O9D(,pxwÃ⚙5(,ugLv⚙ Step #5: GiE,B,,I Step #5: ,(h⚙,g🔗6rZf,(rMÃj,T Step #5: k,(,,ÃdMa🪓7e, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c5", "-d,e"] Step #5: Step #5: Running test ["cut", "-d,", "-f4", "-d,a", "-d,", "-b1"] Step #5: === Compare result for: cut ["-d,", "-f4", "-d,a", "-d,", "-b1"] Step #5: Pipe: a,Ã,mKX🔗T,🔩f1QD4 Step #5: B🔗,Ã(aZDX9,aXCSwvg,XY Step #5: ,D2,HseQ8p🪓0,v, Step #5: di Step #5: sK,vtX,️c,b🔗 Step #5: I,WJ,tRrtp(ÃyM🧰 Step #5: dBVW,jL Step #5: ÃX3️🧰PX,k,L🪛,F(,UD8a0 Step #5: ZUt Step #5: UYoM🪓m,,Ph,r️i,YQ🧰 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-f4", "-d,a", "-d,", "-b1"] Step #5: Step #5: Running test ["cut", "-f3", "-f4", "-f2", "-f4"] Step #5: === Compare result for: cut ["-f3", "-f4", "-f2", "-f4"] Step #5: Pipe: Ã,G🧰 Step #5: 3elFT,e2,Wk5️Q,IhPo Step #5: H⚙wc5,,️o(w2t,vU Step #5: Xaa(,OeqZs,,,️ÃQ Step #5: ,,S9wnwuz,,🪓WcG Step #5: ÃIjPL,Ã,I Step #5: G,PzjNA,(WjsO Step #5: 🪛M0A🪓,e,hm1p,v Step #5: 1ippW,️,H🪓( Step #5: Td Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-f4", "-f2", "-f4"] Step #5: Step #5: Running test ["cut", "-f4", "-d,P", "-d,🪛"] Step #5: === Compare result for: cut ["-f4", "-d,P", "-d,🪛"] Step #5: Pipe: ,s Step #5: ,b6,⚙🧰 Step #5: (,BSOB🔗y🔩,3I( Step #5: IYV,PUF6🧰x9 Step #5: 🪛c,O,4ouVPxC90 Step #5: 🧰eQK,KCnwBFziV,🪛Ã🪓J,cÃnh3kDa,Lk Step #5: B4E Step #5: Tw,fHWU,69D0s,7,X🪛WDFjd6 Step #5: 0 Step #5: ,Wl(,nv Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-d,P", "-d,🪛"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: 🪛cQ2,3(,🪓⚙1C7cf,F🪓 Step #5: va,z,G Step #5: xo Step #5: RyAV34,IE Step #5: Fc,(Ã,xXBUAS,Lv,5F0 Step #5: ,Rn Step #5: SKhZ Step #5: p4QWr,,M🔩x,🪓QQET(,(⚙ Step #5: 2cAÃ🧰2,TPFKD,(z(8Z,Do️pa Step #5: v, Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-b2", "-f5", "-f5", "-b9", "-f3"] Step #5: === Compare result for: cut ["-b2", "-f5", "-f5", "-b9", "-f3"] Step #5: Pipe: Ccxv,,(u Step #5: (,S,mo Step #5: ORCv,0🪓(,44(W(z, Step #5: l,(Pvqx,vwnLW Step #5: ,N,🧰52 Step #5: pD9( Step #5: Z(, Step #5: ,,h🧰9u5N,J(l,ÃIhÃt Step #5: x,w,YSR(omyOn Step #5: Ca,O Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b2", "-f5", "-f5", "-b9", "-f3"] Step #5: Step #5: Running test ["cut", "-c4", "-b7"] Step #5: === Compare result for: cut ["-c4", "-b7"] Step #5: Pipe: Step #5: ,x🧰,AvÃfpL Step #5: oew,,h7Xh,BK((🔗D,KM Step #5: Q,Ndc5KPÃ,9,V,m Step #5: H(0,,🔩,uD6,IMzhcUGD Step #5: Step #5: oÃvK(,Jk🧰,Ã,uwInH Step #5: i Step #5: ,5,B⚙v3p Step #5: ,Ar Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c4", "-b7"] Step #5: Step #5: Running test ["cut", "-f4", "-c7", "-f4", "-b10"] Step #5: === Compare result for: cut ["-f4", "-c7", "-f4", "-b10"] Step #5: Pipe: OjU Step #5: ÃvCL Step #5: ,U8,2,,yDK3⚙ Step #5: Ã,J Step #5: ,q,ÃfDuV, Step #5: Ã,J86,pnPm7, Step #5: 6fB199w Step #5: 🪓Ã,q,e0EeÃ,N( Step #5: swJF6 Step #5: vEl1 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-c7", "-f4", "-b10"] Step #5: Step #5: Running test ["cut", "-d,🔗"] Step #5: === Compare result for: cut ["-d,🔗"] Step #5: Pipe: 2,aefq9🪓z Step #5: v,A, Step #5: fLH️hJ,ÃB,yU Step #5: 3🪛ÃPsUZC(,X🪓QÃ,ÃlPJMnyP,RW(ZQG Step #5: lYV3A🔗oÃI,4EmWV5rQ,,Z,Ã🔩 Step #5: ,H️81(BH,6 Step #5: 9ku⚙HY6vw,🧰 Step #5: E((,L,nS(rE8⚙ Step #5: ( Step #5: C,hr7VAV,,s(,o Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,🔗"] Step #5: Step #5: Running test ["cut", "-b4", "-b8", "-b7", "-d,s"] Step #5: === Compare result for: cut ["-b4", "-b8", "-b7", "-d,s"] Step #5: Pipe: NgD,(8c Step #5: 2 Step #5: k Step #5: 3o,,🧰U,sk4(wOÃG6,3 Step #5: ov5Cel Step #5: 7Ii,Om🔗Q,h(tEuKkQ,,tIPB Step #5: ÃÃNG,eiAA(nH Step #5: B,1pW(,,R Step #5: BY,Qm,E,(,tXW Step #5: ,,🪓Ã(,9A9y3,rs Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b4", "-b8", "-b7", "-d,s"] Step #5: Step #5: Running test ["cut", "-f5", "-f3", "-b3", "-b4", "-d,"] Step #5: === Compare result for: cut ["-f5", "-f3", "-b3", "-b4", "-d,"] Step #5: Pipe: gW7cF,QIr,,6,jj🔗7 Step #5: 0D,a🪛j,CU(ÃNY🧰,ee(KW Step #5: 2X0,NXyjU,, Step #5: k,K,,0Stv,r Step #5: (kVTÃ, Step #5: 4,NWdjAq3hd,V Step #5: FSS,J(, Step #5: nw(r Step #5: yu0yiv,l🔩,s(tp1,1a(baba2,Q7 Step #5: el0🧰3sZt4,Ã🪛Z,i,, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-f3", "-b3", "-b4", "-d,"] Step #5: Step #5: Running test ["cut", "-c6"] Step #5: === Compare result for: cut ["-c6"] Step #5: Pipe: ⚙fK️zÃkoF,7dC,G,p,w2p0xm(g Step #5: j🔗,icU🔗,UF🪓7o Step #5: LXN Step #5: hl,🔗1 Step #5: u,7Kf Step #5: lC8T,,🔗c, Step #5: H🧰y1, Step #5: ,1bxxRba,K Step #5: Step #5: 5Ã,🔗,⚙LU Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b2", "-b7", "-c10", "-b3"] Step #5: === Compare result for: cut ["-b2", "-b7", "-c10", "-b3"] Step #5: Pipe: ,🪛v️,9 Step #5: maP🪓,W Step #5: Step #5: Step #5: cRF Step #5: g,(lnqdyCÃ3,VvgxKmg Step #5: ,l,MLÃw🪛CUs,hÃOC3 Step #5: y,,9,E,b Step #5: PultjJ0️Ã,CySyR Step #5: W️️7LA,q Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b2", "-b7", "-c10", "-b3"] Step #5: Step #5: Running test ["cut", "-b5"] Step #5: === Compare result for: cut ["-b5"] Step #5: Pipe: QÃ1⚙ÃO8i,i🔗R Step #5: F, Step #5: sDxuw Step #5: R🔩,rG⚙,Pjx1n,XzM⚙YQ Step #5: 🧰,,,,w Step #5: ,FL6P,🔩Ã(,b4U,ÃxpÃ🧰u Step #5: J, Step #5: ntyà Step #5: 4lybTBe,cXXaZ,⚙Dc Step #5: gn,🪓f59,o,F Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f3"] Step #5: === Compare result for: cut ["-f3"] Step #5: Pipe: g0Tab(,Dr45🧰 Step #5: j,(🪛ÃTC🧰a Step #5: 1,DxbYLKmj(4,5j Step #5: EzV5,,ÃGxaP,Ãp( Step #5: Step #5: ,,9,4mà Step #5: RO(aAe,qs(6, Step #5: x,7 Step #5: u Step #5: 4ppRqWEO,,4sÃihJ, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,m"] Step #5: === Compare result for: cut ["-d,m"] Step #5: Pipe: ,r,(UG, Step #5: Ã,M(,u6C Step #5: JSL,Clr⚙,Fw,hà Step #5: h,6WGYl Step #5: pBleix,9oQDzG,2r🧰, Step #5: sci🪛tJ Step #5: 33,N🔗Ã(8qÃ,⚙QZ,qk Step #5: 6uk16ZS Step #5: q,Gumx Step #5: O1 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,m"] Step #5: Step #5: Running test ["cut", "giÃ((wÃ", "-f2", "-b8", "-b4"] Step #5: === Compare result for: cut ["giÃ((wÃ", "-f2", "-b8", "-b4"] Step #5: Pipe: JH9,ZF,,0b3g Step #5: 2g,LZ4,3,6ÃW Step #5: h,ÃÃD4,b,qN🔩R Step #5: 1vQÃ9LVÃ,e Step #5: e🪓(vkG,️q,R Step #5: OU,xE Step #5: U🧰️sTNU,️8K7R,wz5 Step #5: 6d(Bt,⚙LCgE Step #5: ,A,e,1Ip,WM Step #5: ,yb,q,ruFÃq Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["giÃ((wÃ", "-f2", "-b8", "-b4"] Step #5: Step #5: Running test ["cut", "-d,2", "j7i⚙", "-d,"] Step #5: === Compare result for: cut ["-d,2", "j7i⚙", "-d,"] Step #5: Pipe: G8 Step #5: Ã(0f,qV🪛jaa,OPE8,,DGq3f8yieQ Step #5: ⚙KY,PÃnm Step #5: m🪓(4R(Ã,M Step #5: 🪓wD,dYÃ(k🧰,hO(o,🪛6,g Step #5: a1A1Re1,(ci🧰U Step #5: X️Kzv,y🪓lc🔗,y(️Vjf,UG Step #5: T(ZRF Step #5: Qqx,,,q( Step #5: 08aH(,,8jnQe,lKdk Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,2", "j7i⚙", "-d,"] Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: 5U(eu,o9w( Step #5: sn🔩hA Step #5: , Step #5: mZhr Step #5: yyah🪛 Step #5: ,(,Ih,V(, Step #5: 4c,2🔩Ã,X,, Step #5: 3,ayR,b Step #5: 96n,wrPCFE,️🪓U,RsÃUq, Step #5: uSTÃETJ,🪓6M Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b6", "-d,X", "-d,"] Step #5: === Compare result for: cut ["-b6", "-d,X", "-d,"] Step #5: Pipe: viDTnCdmjO,6️🪓,Ã,w,rJwRXhNQ Step #5: G Step #5: D,o,,PBFP(DRp Step #5: ,(Y,1,KIc,G Step #5: Step #5: U Step #5: ,BzY,🪓SBG9 Step #5: f5,P🪛8kh, Step #5: yFlD Step #5: Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b6", "-d,X", "-d,"] Step #5: Step #5: Running test ["cut", "-f4", "-c10", "-d,Ã"] Step #5: === Compare result for: cut ["-f4", "-c10", "-d,Ã"] Step #5: Pipe: P66Uui,Ãli Step #5: ,,uD Step #5: 6Y,ow7s, Step #5: kO5,kr(🧰DVs,y🔩S🪓,Y Step #5: o🔗,6iL( Step #5: (️ Step #5: ,hoÃ8Q,f(ZÃs((,njsZ,0(P🪛 Step #5: 9ÃFAj Step #5: 🪓BH2eD🔗,1H Step #5: Df,3Q Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-c10", "-d,Ã"] Step #5: Step #5: Running test ["cut", "-b8"] Step #5: === Compare result for: cut ["-b8"] Step #5: Pipe: ️8uU🪓D,EUv,Ãb, Step #5: J,,(UF🔩,vÃm Step #5: nP74 Step #5: OY7wf Step #5: ️evDiJu,un🪛Vot,hM9cX8eÃ,L,up Step #5: 4,🧰z5🪛,,y,Mrs(CcL8 Step #5: rj8Y🧰,x,y Step #5: Sa,(Ãq,K,️🔩 Step #5: V(9,l Step #5: hc⚙nF,rz5,I,, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f3", "-d,X", "5", "ÃO8(lpMOÃ"] Step #5: === Compare result for: cut ["-f3", "-d,X", "5", "ÃO8(lpMOÃ"] Step #5: Pipe: ÃHhbkc7KJÃ,pj,K,i( Step #5: GQbG( Step #5: Ydy,j90,,e53LÃ,NS Step #5: rF🔩HPs7,🪓F,F4🔩3,2(7 Step #5: ,82H1hppI7 Step #5: 2MQ️,ElC2⚙Sq,,ef0ÃzM️,zkH Step #5: ÃfeSF,,J Step #5: WoGJCS,,S Step #5: wfjBsi,rJ5CBÃ,H9,knKD Step #5: ,,C,Ã,ÃOÃuQ1 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-d,X", "5", "ÃO8(lpMOÃ"] Step #5: Step #5: Running test ["cut", "-b5", "-c7", "-c2"] Step #5: === Compare result for: cut ["-b5", "-c7", "-c2"] Step #5: Pipe: y6uY,t,à Step #5: H,ekÃz,,2rOIXS,8rJ Step #5: ,,T0O,,⚙ Step #5: un,Ii9Ã,🔩 Step #5: nS,,Cn,Ã(b Step #5: D,skzZ,oTw,n Step #5: 🪓Q,2EwoS,uQ,qmkA,oy4 Step #5: ,LIXL Step #5: mfisY2BKw,(B,RAiK Step #5: fMBy,(J(C5🪓HczW Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b5", "-c7", "-c2"] Step #5: Step #5: Running test ["cut", "-c7"] Step #5: === Compare result for: cut ["-c7"] Step #5: Pipe: IÃs🪓E,yi Step #5: ,K3m🔩X Step #5: CPktÃp,0,QzKeÃpÃwf,r Step #5: K,2,(2SInB,K,sH(PH Step #5: w9E2R(,🪓Ohj1🔗eB8 Step #5: H(m,RI Step #5: wv,EQT Step #5: ,8TgyÃZL,w🪛AtakV,,BgAr Step #5: dT,iCO8🪛,SWeY,x Step #5: J4,TkOV,ÃzE Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b10", "-b8"] Step #5: === Compare result for: cut ["-b10", "-b8"] Step #5: Pipe: (,lS🪓T Step #5: Oi,2Umdz6Dd,A🔗i,5XDGog,cWtg🔩V Step #5: l4f,9🔗(CÃ,vOGble Step #5: dJbL🧰C Step #5: o2f(🪓XC,vQ🧰DfÃB,YÃG04V,or,6B Step #5: A,E⚙q,2,, Step #5: Ã,xWO,zÃSL52lbFF Step #5: ,J Step #5: 5S Step #5: g(8e2,Qe,z, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b10", "-b8"] Step #5: Step #5: Running test ["cut", "-b8", "-b7", "-f3"] Step #5: === Compare result for: cut ["-b8", "-b7", "-f3"] Step #5: Pipe: 2Ãt,X,L2u4,Uv5TIfS(🪓, Step #5: Q( Step #5: u🧰8tc,D, Step #5: 3StoÃU Step #5: rjV🪛7 Step #5: 🔩Ã,🔗QhWtu, Step #5: (X,yf,Ãs Step #5: LMAa🧰,nÃdxKU,yk,,y6H1ZH Step #5: F(Av,p Step #5: Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b8", "-b7", "-f3"] Step #5: Step #5: Running test ["cut", "-b10", "-c9", "-d,", "-f5", "-c1", "8l🪛r"] Step #5: === Compare result for: cut ["-b10", "-c9", "-d,", "-f5", "-c1", "8l🪛r"] Step #5: Pipe: BB3,,🪛 Step #5: O4lqVt,s, Step #5: gWy4Jc Step #5: G3tViT20 Step #5: g0jla Step #5: 7🧰,VShaHw Step #5: ,r1t🔗R Step #5: bxztzcH2 Step #5: F Step #5: 🔩ePBaaÃ,yq🪓 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b10", "-c9", "-d,", "-f5", "-c1", "8l🪛r"] Step #5: Step #5: Running test ["cut", "-d,R", "-b9", "-c1"] Step #5: === Compare result for: cut ["-d,R", "-b9", "-c1"] Step #5: Pipe: FLgz,️(F🔗85,hn,D, Step #5: ,zn Step #5: (MMUOF,p(,j(r68Re Step #5: WO,Wv7A Step #5: OJY,🔗a,KvD,N, Step #5: (Ã9z Step #5: ,T5 Step #5: Step #5: y,,w2, Step #5: mP🔩Xb(,FbVx,T,d,XSzr3Gn Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,R", "-b9", "-c1"] Step #5: Step #5: Running test ["cut", "-d,D", "Of3(yA25oKhn", "-b7"] Step #5: === Compare result for: cut ["-d,D", "Of3(yA25oKhn", "-b7"] Step #5: Pipe: ,B,BjI⚙,,h️tYCQ Step #5: ️,️X,r(,7h,hd️VuG Step #5: ,,F,f5,Al Step #5: ⚙5L,🔗Z943Whv, Step #5: c6e3n️,j,N,4vn Step #5: Ãun(3C,,O,8vd Step #5: F5r9ÃtV🪛F,,5🪛, Step #5: o(9ro,ihN4xxrAmr,xo🪛F Step #5: z(dzNAaUÃ,🧰,d,1p(,LVPf Step #5: OpT5jÃK,01ÃTÃB,D,,(🔗l Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,D", "Of3(yA25oKhn", "-b7"] Step #5: Step #5: Running test ["cut", "-f1", "-b7", "Op4WÃ", "r"] Step #5: === Compare result for: cut ["-f1", "-b7", "Op4WÃ", "r"] Step #5: Pipe: MXr, Step #5: ,5Zv,6HpVO,l🪛2DF🪓KoqD Step #5: U1jtzG,S2lk️Zp,,Y,y Step #5: ,C Step #5: 🪓,Es️ql Step #5: T,G6sIÃ,,Ld🪓Ã, Step #5: Step #5: ,ap🪓,🔩hÃ,🔗N,OKRY Step #5: H,aY,f,Dc5,u Step #5: 🪓za,B🪓,N(ÃmYwX,t(soRq,v(SU Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-b7", "Op4WÃ", "r"] Step #5: Step #5: Running test ["cut", "-b9", "-d,"] Step #5: === Compare result for: cut ["-b9", "-d,"] Step #5: Pipe: A🔩w,,((ZEcUto,⚙p3, Step #5: 4o9(🪓,J Step #5: ak,🧰jQZ🪛z Step #5: (🪓qi,⚙Tà Step #5: K,,Th(🔗, Step #5: ,bnH(iHegNj,i,N((Cf🧰🔗G,O Step #5: 7b,G🔗y⚙r Step #5: fÃ,l(Y1WGgB🔩,qÃa Step #5: g🧰K,K(🧰,U3,dh Step #5: OÃ🪛G(,z(,QU,WÃIk Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b9", "-d,"] Step #5: Step #5: Running test ["cut", "-d,", "-c1", "-d,m", "-d,K", "-c10"] Step #5: === Compare result for: cut ["-d,", "-c1", "-d,m", "-d,K", "-c10"] Step #5: Pipe: ZXR7L5,u Step #5: b, Step #5: FFo0Cq(,7w(,ExW,VOzU7 Step #5: vCK🪓🪛b,1NGcd,Ã,OEFC0 Step #5: r🪓(RFs Step #5: ,q10 Step #5: sc,Ps,🔗aBTB🪓n,jP️JÃ5q4A, Step #5: b Step #5: vQw,ÃPjJ(Xb,Ã,(a Step #5: Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c1", "-d,m", "-d,K", "-c10"] Step #5: Step #5: Running test ["cut", "-c7", "-d,U", "-c1"] Step #5: === Compare result for: cut ["-c7", "-d,U", "-c1"] Step #5: Pipe: w Step #5: k5tV Step #5: Step #5: wWz,,D🧰,RMLnpP, Step #5: FQMA,1V Step #5: 4os Step #5: l,🧰, Step #5: ÃaÃSN,ÃbQeZBK⚙B,6️6mF5Hgv,7x Step #5: 🔗g(Eu31️W Step #5: Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c7", "-d,U", "-c1"] Step #5: Step #5: Running test ["cut", "-f5"] Step #5: === Compare result for: cut ["-f5"] Step #5: Pipe: JzihN3 Step #5: ,w⚙🧰ya Step #5: sn🪛j9,pV,71i Step #5: Step #5: hz6L,(p Step #5: CyZYrhON,C58Y6jW((K,(m🪛zNEs,d,🧰 Step #5: (Kg,Ãp⚙WTd,9nh,F🔗zstÃnH,3BMy🧰 Step #5: 3,5(🪓6EN,MU9(🪛sz,,7Ãn Step #5: ⚙02(G,9,o⚙KKpM Step #5: dWPFSzxz Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f2", "-b4", "-c9", "eUAt", "-d,"] Step #5: === Compare result for: cut ["-f2", "-b4", "-c9", "eUAt", "-d,"] Step #5: Pipe: a🪓m,c1hn,L,vT🪛ÃUT, Step #5: ,gv,FaK3 Step #5: Gxpx6,(g,zt Step #5: N4Ãr2s9,,LE5, Step #5: LA,Psà Step #5: n🪛RBQeK🪛Ug Step #5: ⚙fh1,7MÃCD,(A🧰,zHv🪓e Step #5: kwÃ,UPZKch Step #5: 0Ã, Step #5: ,g(Gt,jAWs🧰(,N Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f2", "-b4", "-c9", "eUAt", "-d,"] Step #5: Step #5: Running test ["cut", "-f4", "-d,"] Step #5: === Compare result for: cut ["-f4", "-d,"] Step #5: Pipe: Vtj🪛t,,Ã🔩ÃqXT,SzHzw,k Step #5: up(L,2B5🔗bWÃk(8,Ec4i,r, Step #5: R,🪓ky,V,C7,🔗R Step #5: Xw Step #5: ji1cPN Step #5: Hg8fd4🔩5,JI0 Step #5: ,kaIbÃxD Step #5: W,,,U4à Step #5: ,(,THC Step #5: 5E,⚙5W,fU,,f Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c8"] Step #5: === Compare result for: cut ["-c8"] Step #5: Pipe: SW8bHÃ🔗K Step #5: jBVGa5Ty8 Step #5: , Step #5: ,W63V(,,PzHHkM, Step #5: p0jy,🔗5jqnu,,dMq,Z Step #5: 1syOm2t,JCQdM7 Step #5: me Step #5: sBR54,,🪛 Step #5: ,🪓w Step #5: X,gNAr8D,7G🪓,,à Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c3", "-d,P", "-c9", "-c4", "-d,"] Step #5: === Compare result for: cut ["-c3", "-d,P", "-c9", "-c4", "-d,"] Step #5: Pipe: rEnD8,ui3kC9,THntgu Step #5: 🪛1,0️8,,kFq, Step #5: N9R🔗,⚙S,A🔩6O6🧰Rg,️ÃUÃ,aF Step #5: ÃoN,( Step #5: ,(🪓XZKAC Step #5: 🔩z, Step #5: wn,Ãx,hm Step #5: ,,pV9qq, Step #5: R,MRFBG,,I,L4 Step #5: T🔩,,,9,Sz Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-d,P", "-c9", "-c4", "-d,"] Step #5: Step #5: Running test ["cut", "-f3", "cx🪛LK"] Step #5: === Compare result for: cut ["-f3", "cx🪛LK"] Step #5: Pipe: , Step #5: (,V,G🔗b,9Ã🧰A Step #5: Q7C,3c9Mn,g8vK🔩ÃCa,d Step #5: O🪓X Step #5: P,y,Y🔩ls,J1CnmNF🪛z Step #5: Uq🪓mZ️🔩,Fwl1,TA(N Step #5: hw,6 Step #5: ZlOq5y, Step #5: EP9,D,(3,A🔗w2,Z0 Step #5: x,M(l Step #5: Rust stderr: Step #5: cx🪛LK: No such file or directory Step #5: GNU stderr: Step #5: 'cx'$'\360\237\252\233''LK': No such file or directory Step #5: --- START diff Step #5: -cx🪛LK: No such file or directory Step #5: +'cx'$'\360\237\252\233''LK': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "cx🪛LK"] Step #5: Step #5: Running test ["cut", "-d,"] Step #5: === Compare result for: cut ["-d,"] Step #5: Pipe: Step #5: uhMNT6E,CP,cGP🔗rP⚙ Step #5: KhCT3Z🔩,vzgNi Step #5: 🪓s1,6,H, Step #5: fxX Step #5: ,pt1d7,🔩,S0F, Step #5: wC, Step #5: Step #5: xn,r Step #5: K,p Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,"] Step #5: Step #5: Running test ["cut", "cJ4"] Step #5: === Compare result for: cut ["cJ4"] Step #5: Pipe: 4,🧰N,y(🧰9Hjg,( Step #5: lPQ⚙Xg,,3RwwT,RGG🪛xSf(y Step #5: 2Fi,(🧰5🔩,naSM,Lr🪓vÃuy5B, Step #5: 2,kawvN,, Step #5: cGU,f️🔗t,ni,fDfR,e⚙4dgZdÃzb Step #5: ,🧰 Step #5: Y Step #5: V,(eW,W Step #5: RAVY Step #5: e,5F,️b Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["cJ4"] Step #5: Step #5: Running test ["cut", "-b6", "-c3", "-b2"] Step #5: === Compare result for: cut ["-b6", "-c3", "-b2"] Step #5: Pipe: (,H2(,2🔩i Step #5: 🔩QD4EG,buP🔗5ER,gkk44⚙1,3E,kjÃ8Q Step #5: 5qgpHH Step #5: (HX,fGpÃnz5,ui,Y Step #5: G7t,GÃ,Lyy(KpM Step #5: nML,EgQXeyX,0(7hVh,ekZD8,OpS🪛⚙ Step #5: V⚙ÃGU Step #5: 61(,o,,qBxeà Step #5: 🧰S,TMLSNP,R3 Step #5: ,🔗Xwu9Ã️,8( Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b6", "-c3", "-b2"] Step #5: Step #5: Running test ["cut", "-c4", "-c6", "-f2"] Step #5: === Compare result for: cut ["-c4", "-c6", "-f2"] Step #5: Pipe: (,P4🔩,E🧰(,q,T(gI🪓22 Step #5: lkGI0LB,DdF,,(QW6eV Step #5: OÃr,(,N(fd3O Step #5: (8Jp⚙AK Step #5: Step #5: Z Step #5: Ã,egh,️Q(KX(v Step #5: Z️X5(gKSmw,,6,1, Step #5: jU,sW(5Y,oÃUDzDÃk Step #5: g🔗,sgE Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c4", "-c6", "-f2"] Step #5: Step #5: Running test ["cut", "-d,", "-c7", "-f3"] Step #5: === Compare result for: cut ["-d,", "-c7", "-f3"] Step #5: Pipe: f⚙LBZ,🔗,3 Step #5: 92LZ2u,09t1QWVGg,ON Step #5: ⚙Fb2ky Step #5: ,cÃ,,5n Step #5: 4à Step #5: ,(, Step #5: KVKAj🪛,ShÃ(gqà Step #5: hl Step #5: ,pf,1H,pnLfR( Step #5: ,Y Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c7", "-f3"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: Step #5: Step #5: QTTWFh,u Step #5: Step #5: Pv,L,qhI🔗H Step #5: bb Step #5: m(W(12Vs,,a,ÃUML Step #5: 🔩7xZwXaeP,u🧰pa Step #5: 🪛Or,s,D,1os8Ã(Ã7,Y Step #5: ifqZy, Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-c8", "-d,"] Step #5: === Compare result for: cut ["-c8", "-d,"] Step #5: Pipe: Qz7PYh Step #5: x9aN,qPq2oj,(x9🪓,Ms, Step #5: tA,Zu,UrWd, Step #5: Hy0WM,🪓B60Q, Step #5: e Step #5: sK,QC( Step #5: (l,,,, Step #5: ⚙uÃB1Ãr, Step #5: pYS⚙,8️u,🪓,ngmkYWQ,🔩 Step #5: v(p Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c8", "-d,"] Step #5: Step #5: Running test ["cut", "-c3", "-c4"] Step #5: === Compare result for: cut ["-c3", "-c4"] Step #5: Pipe: UplWh7t,iL Step #5: ÃLDWK,,zmE Step #5: nly5U,️lX,z,,(p Step #5: 🔩9klz, Step #5: (VD2,⚙O,((T,1 Step #5: 🧰Dn5 Step #5: Yp,uq Step #5: 🪛Txx⚙k9( Step #5: ,43F779d,w,QN, Step #5: Ã,,GÃÃgIZK Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-c4"] Step #5: Step #5: Running test ["cut", "41prSCJfhÃGDo9Svg", "-d,"] Step #5: === Compare result for: cut ["41prSCJfhÃGDo9Svg", "-d,"] Step #5: Pipe: YXUNdq️uz,X, Step #5: 08QtPÃ,I🪓🔩S,8U🪓5Av24 Step #5: rj8b,fC(i6,Nf️V5,qRUmF0lbR, Step #5: N,5RhUS Step #5: lUBj2C Step #5: XA0Sr,8s90zb,,mZQN(4ry Step #5: 🔩xxm,,zD,,Btfk Step #5: Lf🔩,zys,cym,zWQ(K🔗️j,vx🪛 Step #5: r,YHMl,0S Step #5: Gt,,5J️jwv6MA Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["41prSCJfhÃGDo9Svg", "-d,"] Step #5: Step #5: Running test ["cut", "-c10", "-d,", "-b6", "-d,", "-b4"] Step #5: === Compare result for: cut ["-c10", "-d,", "-b6", "-d,", "-b4"] Step #5: Pipe: lP🧰I,at,8,Y8 Step #5: C🔩X,🪓 Step #5: Iufy Step #5: ,nM,rVCz Step #5: JB,,iCU🪓3f,ReQH Step #5: r,,ÃE Step #5: (,zs Step #5: btjÃl,((( Step #5: ,uwE Step #5: WK6Ã,p,9qh5ÃsIu,er️5Dbb,k(Ãz Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-d,", "-b6", "-d,", "-b4"] Step #5: Step #5: Running test ["cut", "mUI2", "-d,"] Step #5: === Compare result for: cut ["mUI2", "-d,"] Step #5: Pipe: Ef,,F(,LYJO9z,🔗🔗H Step #5: r,Q Step #5: qs Step #5: ,️⚙,🪓F,ÃgnÃHA,⚙K🪛Ã4 Step #5: ,HkUY,⚙,Ky Step #5: 🔩4VT,🔩Wh,G🧰 Step #5: 🧰w🧰ZMe,(,⚙ZjKy🔗🧰,d0JYuO Step #5: V,kÃ🔩 Step #5: LnÃD,QC,yo, Step #5: ,d,pfUs Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["mUI2", "-d,"] Step #5: Step #5: Running test ["cut", "-b1"] Step #5: === Compare result for: cut ["-b1"] Step #5: Pipe: O(Z7(ÃFRk Step #5: P Step #5: 🧰h,x,y,al Step #5: G⚙4,,76nBuCf3à Step #5: s,aW(u9 Step #5: U,(YND, Step #5: e,UcÃ, Step #5: ,️,ÃS Step #5: T,o8J,rL374🧰YO,à Step #5: ,en,T,🪛pL🪓s,ÃC2T Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b10", "-c9", "-b9", "-c4"] Step #5: === Compare result for: cut ["-b10", "-c9", "-b9", "-c4"] Step #5: Pipe: ,4 Step #5: vLCÃbnGC Step #5: aXL,579(mJB4eÃ,j️R,ivdi,L Step #5: ,,Ã,nN🪛,F🧰p Step #5: h,K,Oxw Step #5: PWX,D🔩t,🔗Q Step #5: R,Ãpta Step #5: 🧰,AAR2jN,x(,z Step #5: ytv,i Step #5: r,fT🔩(A,OÃN(k6, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b10", "-c9", "-b9", "-c4"] Step #5: Step #5: Running test ["cut", "-c1", "-c5", "-c8"] Step #5: === Compare result for: cut ["-c1", "-c5", "-c8"] Step #5: Pipe: tNb Step #5: kÃ,5,,3AV Step #5: DZ,,(Oe Step #5: ,5UIFO Step #5: g,gÃÃ4X Step #5: 1(7x,Pb,(FQs(r7E⚙🔩 Step #5: ,1,O(7 Step #5: (yDY Step #5: Ã,🪓⚙W(J Step #5: ,r🧰,🔗,️Ã⚙nQ Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "-c5", "-c8"] Step #5: Step #5: Running test ["cut", "-b2"] Step #5: === Compare result for: cut ["-b2"] Step #5: Pipe: M4YOB,P Step #5: (🪓Z,yU⚙K3ÃI(,7ÃwÃNN,HcweN Step #5: Ã,xMp0q,⚙PCqQ(,qK,m2N Step #5: 4eVYGoHu,,VI, Step #5: zF🔩YpgO,e6, Step #5: z35uG2️,D Step #5: 🔩,Ib, Step #5: X Step #5: 2Ã,o0T,k,Ã,(E🪛i Step #5: mYM(N Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b8", "-f5"] Step #5: === Compare result for: cut ["-b8", "-f5"] Step #5: Pipe: à Step #5: i,,t, Step #5: YFÃ,,d🧰TnruQ Step #5: (Ãnv,Ãh,N7h⚙ÃTB,🔗 Step #5: jo,,Ão, Step #5: S9KUgc,d,NZ,R2,HDY9 Step #5: Step #5: HF4,a(R1eY,GNTÃgD4 Step #5: LqHm2gi️ Step #5: 9🪓FT🔩U,🪓m,Aà Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b8", "-f5"] Step #5: Step #5: Running test ["cut", "-b4", "-d,T"] Step #5: === Compare result for: cut ["-b4", "-d,T"] Step #5: Pipe: PT,f🪓dw7 Step #5: LYv,ÃG1 Step #5: 5🪛,Jo(🔗36N,,A,u519à Step #5: k Step #5: S, Step #5: ÃG,,,🔗🧰,O3à Step #5: rBYdpK,XV,U🔗iJ Step #5: c(Het,O,rJw🔩ky5,AnVC Step #5: 🔩KÃ,Ão,S(4hu1,gLwZO(MN, Step #5: E,🔩SnR,o,rxÃeU Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b4", "-d,T"] Step #5: Step #5: Running test ["cut", "-c3", "-d,", "-d,", "-c1", "-d,8"] Step #5: === Compare result for: cut ["-c3", "-d,", "-d,", "-c1", "-d,8"] Step #5: Pipe: u(,ÃdJA8🔗,(🪛 Step #5: S,,( Step #5: c,(3 Step #5: (,5️,,ÃGNÃfA,FZGLdG Step #5: ,pFÃXO🔗D,kwzA, Step #5: 6, Step #5: xV9 Step #5: CGQ,Oa24P,VEr Step #5: u,YAHUn,Sk Step #5: dXA, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-d,", "-d,", "-c1", "-d,8"] Step #5: Step #5: Running test ["cut", "-d,G"] Step #5: === Compare result for: cut ["-d,G"] Step #5: Pipe: ie,,PkIpUA,e,🪓6 Step #5: ( Step #5: qpMGA,q0ba(ky,(R🪛Ãs Step #5: 1P3AWhM,Z, Step #5: ⚙z,,🧰gdÃc,t5️⚙eYq Step #5: ,qHeqBJ,Ã4wS,, Step #5: ,j(,u(Lg Step #5: NÃX8kS(,Ã,,1M️e Step #5: mxt,bqdg,vI Step #5: z,H4kXTO Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,G"] Step #5: Step #5: Running test ["cut", "-c9", "-d,d"] Step #5: === Compare result for: cut ["-c9", "-d,d"] Step #5: Pipe: WÃ,Jjx,uÃ2VJv,fmQen🔗Q️,5Qv Step #5: o🧰,aO44NW️n Step #5: 35tBonY Step #5: JD,6gw,Y,16s🔩d, Step #5: Mre🔩,,ÃqZcà Step #5: ,Q🧰C⚙,gnjbQf️G Step #5: QtXvZ4D,i(9Z0,btV Step #5: C8GEL,,SWÃU,( Step #5: ,CTI🔩bD,Idt,M3dM Step #5: fh,H🔗 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c9", "-d,d"] Step #5: Step #5: Running test ["cut", "-d,"] Step #5: === Compare result for: cut ["-d,"] Step #5: Pipe: WZ,🪛🧰v Step #5: ,,CTN⚙S,M⚙ Step #5: Y,KhIÃD Step #5: 1 Step #5: (N,z,kH,SEgAynlcMP,4Z0 Step #5: Step #5: V⚙,(🧰ZR,Wm4F5Ly🪓,I,d2Z Step #5: X4bGw Step #5: SwQÃ,LZ6DdNg Step #5: ,qNmF,,5p Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,"] Step #5: Step #5: Running test ["cut", "-b5", "-f1", "-c4", "cd(🧰"] Step #5: === Compare result for: cut ["-b5", "-f1", "-c4", "cd(🧰"] Step #5: Pipe: U7🔩k(,,3Uo Step #5: z,dfSski,z🪓,s Step #5: 0 Step #5: wt🪛p,r🪛3️R,zkÃ🧰J, Step #5: (,🔗j79,Q7,N,⚙O5🧰( Step #5: 🪓0V🔗6Ts️ Step #5: Zr(9(6,un03j Step #5: UKWp7Mr,EG,(4aL,⚙ Step #5: Tà Step #5: A6bm,R Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b5", "-f1", "-c4", "cd(🧰"] Step #5: Step #5: Running test ["cut", "LO", "-f2", "-f3", "ÃMO", "-c9", "-c2"] Step #5: === Compare result for: cut ["LO", "-f2", "-f3", "ÃMO", "-c9", "-c2"] Step #5: Pipe: Kz(,d🪓8 Step #5: BÃKLmP Step #5: Step #5: xuXFrL🪓 Step #5: g( Step #5: (T,🪓v, Step #5: (,Pwoa Step #5: Step #5: g8b,1S,ÃÃ,️n Step #5: WA,Ã0gJ(,s Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["LO", "-f2", "-f3", "ÃMO", "-c9", "-c2"] Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: ZI,O(,iUc,🔩Rjt Step #5: o7,🧰️,TAAg,hZjC Step #5: V Step #5: ,,q Step #5: (XLh,Ã,irnrt9,2X Step #5: ,mIMuT7V,P⚙V5swvc, Step #5: F,🪓,IC5G,D(Eq🪛 Step #5: et️ Step #5: jWXq,kt,9JHy,x4 Step #5: Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: (, Step #5: ,(P5, Step #5: eS,H Step #5: Uo0CQbXà Step #5: ,04wwG,(CA,8C🧰Ã,e Step #5: Step #5: ((,X,Ã0,Iuv9AO,z9 Step #5: g(c1, Step #5: (bt,l Step #5: Af Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,z", "-d,(", "-f5"] Step #5: === Compare result for: cut ["-d,z", "-d,(", "-f5"] Step #5: Pipe: (qXa,4 Step #5: i,Wg6QV,g,⚙KAoXxU,ka Step #5: Step #5: Bz,FCÃt6aQj,,ÃT(G, Step #5: (,y(,,,z Step #5: ,r,🔗Ã,S🪛1,R Step #5: (,Ws,SHf,j Step #5: 0KO🔗v7YAD,t5hP Step #5: g🪛92, Step #5: ,i,Ed7,r0,⚙ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,z", "-d,(", "-f5"] Step #5: Step #5: Running test ["cut", "-b3", "-f3"] Step #5: === Compare result for: cut ["-b3", "-f3"] Step #5: Pipe: ,,W Step #5: f6,6,,Ht Step #5: RÃXtktNL Step #5: nV,,Hg🪛G0,⚙c, Step #5: ,2MT🔗,dJKHXaQ,YM1,uYM Step #5: ,vwtp, Step #5: pN⚙Q,Wn5ÃbETB,pcH,Q Step #5: V Step #5: a, Step #5: 1m,,,cTm,fir(à Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b3", "-f3"] Step #5: Step #5: Running test ["cut", "-b7", "-d,", "-f1", "-b3", "\u{fe0f}(8"] Step #5: === Compare result for: cut ["-b7", "-d,", "-f1", "-b3", "\u{fe0f}(8"] Step #5: Pipe: T,🪛Rh,OAK, Step #5: v1(Kmd2,,⚙(k Step #5: ocy Step #5: N,, Step #5: Step #5: 9kLl,🧰 Step #5: (5,W️26,J,ÃFVk Step #5: j,Z️H,7d️(uPAy Step #5: MSGQ,UiZL,AA Step #5: (,u(F(T6U Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b7", "-d,", "-f1", "-b3", "\u{fe0f}(8"] Step #5: Step #5: Running test ["cut", "-b7", "-b6"] Step #5: === Compare result for: cut ["-b7", "-b6"] Step #5: Pipe: p,C,ZB,z🔩 Step #5: D,l,ÃPR,RMj,Ãl Step #5: ,B1,(️, Step #5: zn,,B0J Step #5: SPpMN,Q🪛sH,ÃC,Ã🪓iZ🔗ie09 Step #5: YNj,🔩,Ã🪓(5PKx Step #5: O,,ZUÃ9kF,N,tc Step #5: 🔗4,rE3z,Dl,nCLh, Step #5: 🧰🔩Ad,4R7coVO,v Step #5: yq,PGQG,,F1ml,🪓 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b7", "-b6"] Step #5: Step #5: Running test ["cut", "-d,("] Step #5: === Compare result for: cut ["-d,("] Step #5: Pipe: 🪛h7S,5tlM,0X Step #5: VnTf Step #5: V,L,,r,KgG Step #5: 4️M Step #5: LT,(,1Q Step #5: zn,O, Step #5: Ã(ÃC,(C6YZ(,xc,N Step #5: xp(,2b4 Step #5: 52Qa,iJ9x(kS Step #5: ZZ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,("] Step #5: Step #5: Running test ["cut", "-f1", "-f4", "-d,", "-d,"] Step #5: === Compare result for: cut ["-f1", "-f4", "-d,", "-d,"] Step #5: Pipe: ,a,RAiiY Step #5: cB,,alf1,️p Step #5: 🪓(jf Step #5: ,,k🔩 Step #5: U,,(,🪓,MzyV Step #5: OÃZG3D,UX,s,i Step #5: H,(,I,vKH(wHr2, Step #5: JB,V, Step #5: Bm1,,D,4 Step #5: eEKwhx5v Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-f4", "-d,", "-d,"] Step #5: Step #5: Running test ["cut", "-d,", "-c10", "-c1", "-c5", "-b10"] Step #5: === Compare result for: cut ["-d,", "-c10", "-c1", "-c5", "-b10"] Step #5: Pipe: s,G,🔗z️abOAXKY,qT Step #5: ️,V Step #5: 0l,mW0CÃ1h,He,ngOYheM,T Step #5: 1u,,cw,,L Step #5: ,NQ Step #5: v,d Step #5: (q,lA,E,lKbg🔩GG🪛,r8j( Step #5: ,l Step #5: 6v, Step #5: u Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c10", "-c1", "-c5", "-b10"] Step #5: Step #5: Running test ["cut", "-d,"] Step #5: === Compare result for: cut ["-d,"] Step #5: Pipe: mOoKqQ,Ãa,v501,,c Step #5: vw1xcpp,5g Step #5: B(q0ÃL Step #5: cZ00⚙a,TS,Wp7SD️🔩27 Step #5: 7 Step #5: c,1FW️8TY3🧰,,, Step #5: ,,(n⚙q🔗yzz Step #5: u,O,z3, Step #5: ZQb( Step #5: ÃHd,QVmNxn( Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,"] Step #5: Step #5: Running test ["cut", "-c10", "-c6", "-b6"] Step #5: === Compare result for: cut ["-c10", "-c6", "-b6"] Step #5: Pipe: tzIP Step #5: nÃ7lÃDN,O,L,ÃRo3ÃHD8u,x9 Step #5: h🪓,Z Step #5: h⚙f,(5RÃ0awGn,⚙w(Zch,uLr7(eNz Step #5: ,ÃRyyqp,(B, Step #5: b🔗️i,tw1zl2 Step #5: m,gk,N🪛a️v,3hV, Step #5: ,17,Ã, Step #5: v7, Step #5: B0,,J Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-c6", "-b6"] Step #5: Step #5: Running test ["cut", "-f5", "-d,h"] Step #5: === Compare result for: cut ["-f5", "-d,h"] Step #5: Pipe: (K,🪓b1N,eqGx,,I5 Step #5: 🪓gFm🧰 Step #5: Step #5: ,Cvl,1WA,HÃp,(X Step #5: ,TW,f,rLr,X2k🪓xAHà Step #5: ,, Step #5: I87,B,(,z,Dl Step #5: v🧰Ãt🪓9, Step #5: B,P,8️iVNtd Step #5: 9Co, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-d,h"] Step #5: Step #5: Running test ["cut", "(7🔩F", "🔗yDoi", "-c9", "-f5"] Step #5: === Compare result for: cut ["(7🔩F", "🔗yDoi", "-c9", "-f5"] Step #5: Pipe: Ã,ÃaI🪛H,0Ã,4(,X6 Step #5: C,,p Step #5: 🔗ÃinH,WOnFEQ️,Bg🔗fH️E Step #5: u,x Step #5: N,y,,7t Step #5: t,mÃ08lu(5,r,OH Step #5: LÃxÃG,,⚙c86i,Gh,u( Step #5: XE2LÃ,(S2 Step #5: XÃ,z(C🪛X1Q,L,N️i4P Step #5: Ã,️(2RR7,🪓🪓YgwM Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["(7🔩F", "🔗yDoi", "-c9", "-f5"] Step #5: Step #5: Running test ["cut", "-f3"] Step #5: === Compare result for: cut ["-f3"] Step #5: Pipe: p,b, Step #5: ,XÃR Step #5: e7f( Step #5: ÃHpÃ, Step #5: S2i,(V,X9xÃ,x Step #5: ⚙C8a,XnF,F62🔗vJLF1Ã,R,f Step #5: XvbKoÃ,VL,(QYN,7🪛,nI(4T Step #5: aJKQwg7q Step #5: 8,,🪓h,yy,l️ZH Step #5: ,j Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f3", "8B🪓NrB", "-c4", "-c9"] Step #5: === Compare result for: cut ["-f3", "8B🪓NrB", "-c4", "-c9"] Step #5: Pipe: 8X,s🔩,cLVD(🧰,S,yGPf🧰Z Step #5: g Step #5: iÃY4O️d,1k,🪛,Z(v37(J Step #5: ,vZmn Step #5: 5E🪓x,W8Oo🪓,b,4, Step #5: MÃU Step #5: a2(uÃm,4 Step #5: 🪛ÃÃoq,v3,x,TH Step #5: ,qnq,,️tqWu,🔩vmJqK Step #5: 2F3H,2JQi🔗zD,,p,(Xi Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "8B🪓NrB", "-c4", "-c9"] Step #5: Step #5: Running test ["cut", "-b10"] Step #5: === Compare result for: cut ["-b10"] Step #5: Pipe: o🧰Jx,v🪓,A,🪛vY7,rug228 Step #5: WGN🧰,,Ã🪛ÃI,(1🔗aKyDU Step #5: 5,Klo2Ke3🪛(,p9Ãk,H️🪛R️(,ÃUh Step #5: 🔗wZÃB6y,bdw5,r Step #5: 4Rd1P🔩Ã0,15puO,GsaZ Step #5: 🧰,Ih,6Ã,DoAcW,(🔩 Step #5: ,73Xvl(🪛 Step #5: 67JMowV,l,S,TÃPNrKOA Step #5: L2,,Gf,w Step #5: Ã,0,1F,8QgHuÃJ Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: N,6,HÃhrY,w Step #5: sÃ,m🔗,hfKPF1 Step #5: nduE,o,ÃoJmZqvxn,4,j Step #5: IBhfS,(( Step #5: e,syL Step #5: 5,jg,,(,Gq Step #5: (O, Step #5: Step #5: e8,Z,m Step #5: z, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,"] Step #5: === Compare result for: cut ["-d,"] Step #5: Pipe: ,,,🧰v Step #5: BOY(8,6🔗R,E7o⚙S,, Step #5: vty,C7⚙JB,J3(LhT,u️7zN2️ Step #5: Step #5: ,,,V,VjF Step #5: ÃlSl️F,,0b,kV,t Step #5: 4,S,ce5 Step #5: ÃcoqW🔩,,K,🔗️7, Step #5: 🔩DVea️,8uf Step #5: (8,XOPNgfa,35,ZZehr🔗b((,0 Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,"] Step #5: Step #5: Running test ["cut", "-c9", "-c7"] Step #5: === Compare result for: cut ["-c9", "-c7"] Step #5: Pipe: Ã,j,Ã5C🧰 Step #5: 7,g,mW,J️6 Step #5: vOEt,🪛kBÃ,p🧰jaVpE,pv🔗e Step #5: y(,⚙,2q7AAuT3I, Step #5: ,,oV,(, Step #5: 🔩 Step #5: jVuahW,ccz,,XZKE, Step #5: ,P0Ã, Step #5: O,nvÃ,j49,F,l18nDB Step #5: FFN Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c9", "-c7"] Step #5: Step #5: Running test ["cut", "-d,", "-c8", "-b4"] Step #5: === Compare result for: cut ["-d,", "-c8", "-b4"] Step #5: Pipe: Step #5: 9,,,h2( Step #5: 🪓7t6Xhzs,2cKuj️, Step #5: 3lA, Step #5: O Step #5: 🔗,(AtxkJv,(aikHpS(p,,Ml Step #5: Cds,v⚙LYB,zmHÃWO,1M4CÃ2, Step #5: 🔩a Step #5: s,GÃy,n️ÃhqY,D🔩gÃvr Step #5: Cr0,n9⚙zv,I2,7pà Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c8", "-b4"] Step #5: Step #5: Running test ["cut", "-f4", "-b6", "-f3", "-d,g"] Step #5: === Compare result for: cut ["-f4", "-b6", "-f3", "-d,g"] Step #5: Pipe: nVe,SIa8,EFzbKCw,,5nwF Step #5: Ã,k,SY🔗Ã7,hXa,7 Step #5: gFWÃ9,R🧰51a6 Step #5: qjWLhbv,MEjLR🧰 Step #5: ⚙lj,b,0🧰f2PQ,,(🔗u0sPac Step #5: ymE️Ã4🪛b Step #5: j Step #5: 4iZq,bcOI🔩cT,uaooD Step #5: w55 Step #5: Nfr9Jz,🔗aD Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-b6", "-f3", "-d,g"] Step #5: Step #5: Running test ["cut", "-d,f", "-d,", "-f5"] Step #5: === Compare result for: cut ["-d,f", "-d,", "-f5"] Step #5: Pipe: L🪓ÃLWN Step #5: ,iF4T Step #5: ÃkVx0v🪓C,,,W,Jie Step #5: 2N64,w4,(vJlw2, Step #5: z,dR Step #5: 🧰8🔩Edg,5H5,O,6 Step #5: 5 Step #5: S1t,,⚙0r,F5PMx83, Step #5: bki,4 Step #5: x,xYFx,T11ED93x Step #5: Rust stdout: Step #5: L🪓ÃLWN Step #5: Step #5: Jie Step #5: Step #5: Step #5: Step #5: 5 Step #5: Step #5: Step #5: Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -L🪓ÃLWN Step #5: - Step #5: -Jie Step #5: - Step #5: - Step #5: - Step #5: -5 Step #5: - Step #5: - Step #5: - Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cut ["-d,f", "-d,", "-f5"] Step #5: Step #5: thread '' (2069) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cut ["-d,f", "-d,", "-f5"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2069== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x46,0x46,0x45,0x46,0x46,0x46,0x46,0x46,0x46,0x46,0x46,0x46,0xd,0xa, Step #5: FFEFFFFFFFFF\015\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-984887f88c89030eb3b887407c0db29d99bb1dbb Step #5: Base64: RkZFRkZGRkZGRkZGDQo= Step #5: MERGE-OUTER: attempt 2 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765694414 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge2016.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cut/984887f88c89030eb3b887407c0db29d99bb1dbb' caused a failure at the previous merge step Step #5: MERGE-INNER: 322 total files; 255 processed earlier; will process 67 files now Step #5: Running test ["cut", "0", "-c3", "-f3"] Step #5: === Compare result for: cut ["0", "-c3", "-f3"] Step #5: Pipe: Step #5: DT,,MDEÃ🔩m,,i Step #5: cg,h,n Step #5: 6ÃQkS,6p1R3z,Tt,b4, Step #5: Sc,FdV,3,RdR40q(q,m Step #5: veGcDk5n,RU, Step #5: D6FÃg,t,,E Step #5: ,,(afsl Step #5: ,WH🔗cxG( Step #5: M8K,e,C, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["0", "-c3", "-f3"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["cut", "-b7", "0Z4rT1kSDeb", "-f5"] Step #5: === Compare result for: cut ["-b7", "0Z4rT1kSDeb", "-f5"] Step #5: Pipe: ,1🧰uZÃMJ,BPzVD,s2LÃ9WqX,bHJKa🔩0m Step #5: ,Ff7,l,🔗,️w Step #5: 9 Step #5: Step #5: P🔗sEcoe,hq,🪛⚙t, Step #5: DXv🔩⚙y Step #5: 🪛⚙A Step #5: s,(sc(r,,m, Step #5: 9CzyTj,ST Step #5: z,o Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b7", "0Z4rT1kSDeb", "-f5"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-c9"] Step #5: === Compare result for: cut ["-c9"] Step #5: Pipe: k(lBÃBk,qÃl, Step #5: i️a,,,EÃ, Step #5: U,LXB️mj Step #5: ,ITvWo,RJ01e1hÃ,H0N8NÃw Step #5: i,z, Step #5: ktÃ5x Step #5: N,F,n65k3 Step #5: Step #5: ,,kJm,rzJ Step #5: 9(,ypw,gT,,0Nà Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b3", "-d,H"] Step #5: === Compare result for: cut ["-b3", "-d,H"] Step #5: Pipe: ,8, Step #5: tHhe0L Step #5: 3,F(m🧰R,(7M,,Q Step #5: Step #5: d Step #5: Xn7,S3RÃ,9 Step #5: ,qTx4,O🔩L5 Step #5: ,,X,1🪓L🪛lbuV Step #5: jV(P,🔗,Wv,JPà Step #5: ir2,92zn,n,️ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b3", "-d,H"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-c8", "9FlJsA7CdvFTNtÃ", "-f4"] Step #5: === Compare result for: cut ["-c8", "9FlJsA7CdvFTNtÃ", "-f4"] Step #5: Pipe: q1L7n,,(à Step #5: V Step #5: OPÃAy Step #5: Ãpy,9,L🪓, Step #5: KU53ÃH,cc1QBa(p️d,u,s90t00,o(F0 Step #5: gVr,(V🪛WHk,Kt⚙HFu Step #5: ÃNKzU0so,PlEuYW,A,zp🔩 Step #5: Step #5: RKHbX,W(b Step #5: , Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c8", "9FlJsA7CdvFTNtÃ", "-f4"] Step #5: Step #5: Running test ["cut", "-b5", "-b4", "oX🧰6Ro", "-d,w"] Step #5: === Compare result for: cut ["-b5", "-b4", "oX🧰6Ro", "-d,w"] Step #5: Pipe: 🔗🪛,XPJc Step #5: 🪛xk,rzUwBppRVy,OqY(nLd Step #5: 🔩fC,ZHbRa,R,n,🪛0à Step #5: ,4 Step #5: ÃyL,🪛d(,1🧰QK, Step #5: W(,KÃ28 Step #5: ylP,,LsfTVbWrh Step #5: 🪓X,K🧰 Step #5: 6JotVBdS,🔩d,,( Step #5: j(ÃÃ,7JÃ🧰,WDdà Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b5", "-b4", "oX🧰6Ro", "-d,w"] Step #5: Step #5: Running test ["cut", "-f4", "-f4", "-d,", "-f3", "🧰", "R\u{fe0f}X0IPÃKc"] Step #5: === Compare result for: cut ["-f4", "-f4", "-d,", "-f3", "🧰", "R\u{fe0f}X0IPÃKc"] Step #5: Pipe: ,Aj,ÃD🔩Zà Step #5: w,, Step #5: kvWÃoO Step #5: PeB🪓,Ãgu Step #5: dC Step #5: smT,,og, Step #5: E3️,mc2 Step #5: Yl,,Mjevu Step #5: q,(lNz5, Step #5: bÃRZJz,p,Ã8X( Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-f4", "-d,", "-f3", "🧰", "R\u{fe0f}X0IPÃKc"] Step #5: Step #5: Running test ["cut", "-d,", "-b5", "-c2", "-d,"] Step #5: === Compare result for: cut ["-d,", "-b5", "-c2", "-d,"] Step #5: Pipe: n3,4🪓Gx,LaQ,VJvE,8l Step #5: I4,L,u Step #5: tUMw Step #5: ️3,Z(,vD88(b3J9,O Step #5: W,YhxvAL Step #5: J,J5l,4JJcUBf Step #5: C3, Step #5: ,,ÃS Step #5: 🪓,j🔩987Z,,Z,🪛j Step #5: Z Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-b5", "-c2", "-d,"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: g2cj33⚙🪓,J3,kRm Step #5: id,I🪓p0C,(S,rj0N, Step #5: rofà Step #5: ,K,t,🪛 Step #5: ⚙vVlnEL8T,e9r,2AÃqyN,6,S Step #5: wj🪛x,QjTe,uviJBÃDFGP,b(fY Step #5: b,,Twa Step #5: h🔗o9IJJÃ,🧰sÃLkF1,qÃ3,IbepX3kE(A,3OgD Step #5: ,,d,8, Step #5: (KdZ,, Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-c2", "-b3", "-b6"] Step #5: === Compare result for: cut ["-c2", "-b3", "-b6"] Step #5: Pipe: qWBjÃtnD,xÃi,rpYqv Step #5: ,IS,tBà Step #5: (0ugX,p,🧰R1⚙,A7🪓J Step #5: ,Kpoe, Step #5: o,1🧰Oy,,j,9 Step #5: ,IM,p( Step #5: U,W9,R Step #5: 🧰J Step #5: 6jpS,,x Step #5: u4, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c2", "-b3", "-b6"] Step #5: Step #5: Running test ["cut", "-d,", "-c1", "-c10"] Step #5: === Compare result for: cut ["-d,", "-c1", "-c10"] Step #5: Pipe: LFA(GFM0,(à Step #5: 2,Oja Step #5: ,⚙Wt,vflpSFWH,wHz5🔗, Step #5: r️,PÃ,L,MD9, Step #5: rl(((v,L2Bh,m Step #5: ️1Ã,⚙6OWxGu,l,tlW0 Step #5: r,1⚙, Step #5: p(,(M Step #5: ( Step #5: dd Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-c1", "-c10"] Step #5: Step #5: Running test ["cut", "-c5", "-c10"] Step #5: === Compare result for: cut ["-c5", "-c10"] Step #5: Pipe: , Step #5: LH,,8yÃMHPB Step #5: 9P Step #5: oÃ4aTV,h7 Step #5: L⚙ Step #5: Y️, Step #5: uKGBV,⚙o,B,E Step #5: 6XSfO,,Nwz(ZXQF Step #5: sXC⚙Lv,,yMDp⚙EzQ Step #5: iA(,G,, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c5", "-c10"] Step #5: Step #5: Running test ["cut", "-f3", "ry", "u🧰7(40"] Step #5: === Compare result for: cut ["-f3", "ry", "u🧰7(40"] Step #5: Pipe: 🪛uOa Step #5: rCÃ9,7,(zJ,5,8 Step #5: Z,🪛,s,,tF(( Step #5: T,Gh,w Step #5: 🪛,️e🧰MRI,D(,Xon Step #5: CueGs,,71🪛Rf,, Step #5: jl Step #5: Iv1w,Ãygdck,ÃQr8 Step #5: lOwlE,,mF Step #5: 0BWh Step #5: Rust stderr: Step #5: ry: No such file or directory Step #5: fuzz_cut: u🧰7(40: No such file or directory Step #5: GNU stderr: Step #5: ry: No such file or directory Step #5: cut: 'u'$'\360\237\247\260''7(40': No such file or directory Step #5: --- START diff Step #5: ry: No such file or directory Step #5: -fuzz_cut: u🧰7(40: No such file or directory Step #5: +cut: 'u'$'\360\237\247\260''7(40': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "ry", "u🧰7(40"] Step #5: Step #5: Running test ["cut", "-d,(", "-c6", "-f3", "-c3", "-b3"] Step #5: === Compare result for: cut ["-d,(", "-c6", "-f3", "-c3", "-b3"] Step #5: Pipe: g,(,K🔗ÃL,B Step #5: UDL,Ug️gj,a,U Step #5: ÃzP,Ã,🪓dy,⚙WNsH74n(I Step #5: F Step #5: YjgNe,V,V Step #5: x🪓,lE(🔗,W,,nB Step #5: Ã,(wem(,q🧰c️ Step #5: j6 Step #5: J️vi Step #5: Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,(", "-c6", "-f3", "-c3", "-b3"] Step #5: Step #5: Running test ["cut", "-f2", "-d,🪓", "-b3"] Step #5: === Compare result for: cut ["-f2", "-d,🪓", "-b3"] Step #5: Pipe: W1L0 Step #5: h3 Step #5: UfycZn6A9,w Step #5: qjChÃG(l,0,(t,E Step #5: 1,Y,F(ra,,X6 Step #5: ,1️,,T Step #5: (5y(,Xp,9 Step #5: x8Bnclt Step #5: uglÃu,(,eÃZ🪓3,b, Step #5: ws,(,, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f2", "-d,🪓", "-b3"] Step #5: Step #5: Running test ["cut", "-b3", "-b4", "i"] Step #5: === Compare result for: cut ["-b3", "-b4", "i"] Step #5: Pipe: ,z0llo,r🔩g Step #5: ️,8v(hYCmj,0lpMv7,🪛,hq1Ãe0 Step #5: Step #5: YqN, Step #5: 9F,,aRyà Step #5: N(d🧰s,A🪓L🔗,5b⚙U Step #5: VPu6 Step #5: RGHÃtgbB,ExwJ,,ces️ Step #5: x,OD,HxÃG Step #5: ️ Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b3", "-b4", "i"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-c3", "-b1", "-b5"] Step #5: === Compare result for: cut ["-c3", "-b1", "-b5"] Step #5: Pipe: w🧰UA,Kpià Step #5: ,4🔗3,🔩FH,1🔗,PÃG Step #5: D3A2B,a,PIrQà Step #5: ,HI,E3X Step #5: QeMnq Step #5: 5 Step #5: ,N Step #5: ÃVOd4 Step #5: uE,k,F,K Step #5: ,vX,t🔗3s,P5 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c3", "-b1", "-b5"] Step #5: Step #5: Running test ["cut", "-f1", "TÃ🪓BÃ7⚙sN2tX", "-c3", "-b5"] Step #5: === Compare result for: cut ["-f1", "TÃ🪓BÃ7⚙sN2tX", "-c3", "-b5"] Step #5: Pipe: ,à Step #5: 🔩,U Step #5: z🧰zIs,9iWi(HI🔩,(R,lAcÃ34Zn,D Step #5: 3FA, Step #5: jZ,Ioa,kI5🔗,PNCuTqYRG,(rKTYR Step #5: vh,CLR🔩7,F,PFA8ÃdJ5 Step #5: 🪓z Step #5: Iv,J(,Nim,P(, Step #5: ,C,6k🔗j🔩Bj((🪛 Step #5: XR,Ã🔗A Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "TÃ🪓BÃ7⚙sN2tX", "-c3", "-b5"] Step #5: Step #5: Running test ["cut", "-f4", "-d,", "-d,p", "-f4", "-b9"] Step #5: === Compare result for: cut ["-f4", "-d,", "-d,p", "-f4", "-b9"] Step #5: Pipe: Step #5: k,Y,gOjcr045WÃ,Z Step #5: ,Ã5 Step #5: 4z Step #5: ,j,U Step #5: PC,km🔩Xb,,xwC Step #5: a68⚙ Step #5: HbDOP90Q,,Ã4 Step #5: A,kKT,VS,1S🧰,h Step #5: iwaGa,j(Z7t,K, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f4", "-d,", "-d,p", "-f4", "-b9"] Step #5: Step #5: Running test ["cut", "-c3"] Step #5: === Compare result for: cut ["-c3"] Step #5: Pipe: Step #5: K,,t Step #5: 69H,KwPYp,,b Step #5: zHL,k Step #5: ,,r0gl🪛⚙I, Step #5: pNHi🪓X,Q,U6 Step #5: ,nmZvVeHp,Pxd🪛,aÃ,hf🔩 Step #5: ,t(,Ãe🪓,(WW27 Step #5: ,Eqn9Pb🪓🔩,(,Ãy,A4k Step #5: ,qgbS, Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c7"] Step #5: === Compare result for: cut ["-c7"] Step #5: Pipe: ,ÃaÃknÃIÃL Step #5: H,hÃNk,QS Step #5: ÃxhDci,,id,5((HbZ2io Step #5: x,I,tOp️ Step #5: hekm Step #5: Mj,4 Step #5: ,K,,ZYN Step #5: TÃrI2G⚙,5qn5qic,A,Iv Step #5: ÃBIc🪓,eg🔗aL2 Step #5: 7T🔗lTc,s,xMA,8hJ,( Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "uÃo7", "-b9", "-b8"] Step #5: === Compare result for: cut ["uÃo7", "-b9", "-b8"] Step #5: Pipe: ,z🪛(b,ÃI9,A, Step #5: ,,,EDR Step #5: (Nn,u🔗g,XÃWUTu,yM6S( Step #5: xPh6Kndp,🔗HA,⚙,Y Step #5: K,X,nD,5yRl⚙5 Step #5: wvo,3,j Step #5: tza2,3P🪛dLTR,g🔩H🔩,JKmv Step #5: qh Step #5: IÃ⚙,r,,E⚙I Step #5: w,fr🪛No Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["uÃo7", "-b9", "-b8"] Step #5: Step #5: Running test ["cut", "-c9"] Step #5: === Compare result for: cut ["-c9"] Step #5: Pipe: E7JZ,Q,VfÃÃupx7, Step #5: lVu,MmiZ51lLY,vs Step #5: jXc,Ãf,HBOi,(NWZ🔗 Step #5: lB,WC,UjGkVÃLa, Step #5: 🧰d,Ã9🔗⚙g,tn, Step #5: W,yÃ7,🔩 Step #5: ,Ei,ÃG,(, Step #5: Lk,Z Step #5: t(QEI,8DÃy,W Step #5: O5ru,(Ã,54Xd Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,", "udSS", "-d,", "-f3", "-f5"] Step #5: === Compare result for: cut ["-d,", "udSS", "-d,", "-f3", "-f5"] Step #5: Pipe: ,ip🪛LY,rV🪛(M,d Step #5: Step #5: GR, Step #5: ,54lSVM,p,Yi8,⚙75 Step #5: i,️ÃE Step #5: Z,,jl2,T Step #5: à Step #5: eiÃHP7x🔗,U Step #5: Z(Sh,,2uY,m Step #5: C1,🔗,6jÃ,Phà Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "udSS", "-d,", "-f3", "-f5"] Step #5: Step #5: Running test ["cut", "HLUW", "-d,"] Step #5: === Compare result for: cut ["HLUW", "-d,"] Step #5: Pipe: , Step #5: UVTidÃ,rh(l0EvZ,Og(4,ÃQÃj,4⚙ Step #5: C,X,H🧰 Step #5: (W(b,ÃWp,5t🧰l Step #5: Step #5: n2U,r,4ae Step #5: 🔗6R,r,,jId,r Step #5: Step #5: RcJdl,,3t,,((c Step #5: Ã,I2(Sbui,bWz Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["HLUW", "-d,"] Step #5: Step #5: Running test ["cut", "-b4", "Ãjrf", "-d,", "-d,q", "-f4"] Step #5: === Compare result for: cut ["-b4", "Ãjrf", "-d,", "-d,q", "-f4"] Step #5: Pipe: Step #5: Step #5: H,rvqGGH,Z Step #5: F🔩Ã,R⚙PA,B,GyyiXÃà Step #5: s4R🪓8Ã38,🪛,M239 Step #5: qmKjRhoÃO,sjD(Iu(,SmD,( Step #5: ,dD,t,,b(( Step #5: (Fs,,(vk, Step #5: g, Step #5: 8K,1ZÃ🪓U,0d1d,ÃM🔩p Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b4", "Ãjrf", "-d,", "-d,q", "-f4"] Step #5: Step #5: Running test ["cut", "-f5"] Step #5: === Compare result for: cut ["-f5"] Step #5: Pipe: wGPh(,Y,(,vR Step #5: U(5t🪓y,Z4Y🔗3p(1 Step #5: ,🧰zh8ur,,F🧰9THimu,f⚙m Step #5: Q8vA,x🔗I Step #5: 🪓I, Step #5: bbo,V🪓SM((TM,,k Step #5: WE Step #5: fe,1tFbZ,MawHaMy Step #5: z(🔩 Step #5: ,Vn🔗r,ÃL,rPxAk Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-c1", "NwjZ🔩🔗nw4xb🪓", "-d,", "-d,", "-f5"] Step #5: === Compare result for: cut ["-c1", "NwjZ🔩🔗nw4xb🪓", "-d,", "-d,", "-f5"] Step #5: Pipe: li,o0ÃU,BÃ,p Step #5: d,T(m(Ã,e0⚙Sa,Ã, Step #5: WH,r🔩RDC Step #5: ,tVSG,JC🔗a Step #5: MyA,,b1Ã4bw(🪛( Step #5: v,u,ZÃe1nÃ,x0((🔩ÃC Step #5: ⚙🪓WR4X Step #5: ku🧰Q Step #5: ,t🔩23 Step #5: R,,r,T,P🪛mZ Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c1", "NwjZ🔩🔗nw4xb🪓", "-d,", "-d,", "-f5"] Step #5: Step #5: Running test ["cut", "-f5"] Step #5: === Compare result for: cut ["-f5"] Step #5: Pipe: vJ(tok0(,🔩sFh, Step #5: ,,k Step #5: Eqlf0 Step #5: A Step #5: N️U,bÃ,chn,,🔩J Step #5: RJ6wTO,CC,1️ Step #5: 🪛P, Step #5: Step #5: d,oc Step #5: a Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "M", "lz4Ikx5", "-f3", "-d,o", "-b5"] Step #5: === Compare result for: cut ["M", "lz4Ikx5", "-f3", "-d,o", "-b5"] Step #5: Pipe: LfI,k,F8🔗2,F0W Step #5: g(grj,h(,(,Ã,⚙Ug🔗S Step #5: U,xÃ⚙IiOu,q Step #5: ,,8 Step #5: N,Ã0Y,,Z Step #5: Step #5: GpN,6,aUl3a,O6S( Step #5: I️c, Step #5: , Step #5: (Rg,,qH Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["M", "lz4Ikx5", "-f3", "-d,o", "-b5"] Step #5: Step #5: Running test ["cut", "v", "6(🪓4kIyCG", "-c1", "YÃ", "-c10"] Step #5: === Compare result for: cut ["v", "6(🪓4kIyCG", "-c1", "YÃ", "-c10"] Step #5: Pipe: 3,K,J🔩(ÃqR, Step #5: 6kx,FE,MJ Step #5: qa,mzj,Ã9zJ, Step #5: jXR,uT,z2,sS Step #5: ,I,X,,3E Step #5: xlD,,🔩,8yg,M Step #5: Ã, Step #5: Ãy,,a(🪛ÃB,T,jeNcsN Step #5: ,XG🪓, Step #5: ,,UqET,L,(2 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["v", "6(🪓4kIyCG", "-c1", "YÃ", "-c10"] Step #5: Step #5: Running test ["cut", "-d,", "-b5"] Step #5: === Compare result for: cut ["-d,", "-b5"] Step #5: Pipe: AY️ Step #5: O,5,V Step #5: ,mÃcq,(,OLqJv,4Z🔩🧰 Step #5: BNODm,HWAÃQ Step #5: ,,,u2PLU,MEu Step #5: yr,s8xÃe(4,,🔩z6hmzj Step #5: Ã,dv Step #5: c,🧰C7cW Step #5: DjCaw,JV Step #5: 3⚙Lq,X,ÃO(y⚙3,P, Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-b5"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["cut", "-f1"] Step #5: === Compare result for: cut ["-f1"] Step #5: Pipe: P,PW🪛Ã,R Step #5: ,D🔩🪓1,AÃKX,⚙gO Step #5: bZ🧰HW(U Step #5: fX7🔗cYK,Q,4Eq Step #5: 🪓XD🔩,y,1️ÃVMFkp Step #5: R6lenY,HEa, Step #5: ,OWmfDk🔗W,d,n9OÃq,jRNpCS Step #5: (q98, Step #5: T,🔩,NCaiR,, Step #5: ÃFNk Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,", "-d,", "-b4", "-d,"] Step #5: === Compare result for: cut ["-d,", "-d,", "-b4", "-d,"] Step #5: Pipe: npV Step #5: I,pp,,(🪛N2🧰g Step #5: ,MDG3W Step #5: nPFPNm Step #5: 4,Te7q(🔩,ID2l,🪛,0r Step #5: q,,XlKRQz Step #5: DVSÃ🔩,H1 Step #5: z4T Step #5: C, Step #5: 🪛UJ🔗KQ,v4v, Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,", "-b4", "-d,"] Step #5: Step #5: Running test ["cut", "-d,6", "-d,", "-c3"] Step #5: === Compare result for: cut ["-d,6", "-d,", "-c3"] Step #5: Pipe: (,dbrS,,🔗d,4Gu Step #5: (B,VjxÃMQh,8GLS🔗Ãb Step #5: ,veQx Step #5: ,v Step #5: (J4T,C(IB6ZpuZ, Step #5: ,rRLr,gID2DN0,Ã🪓OzTÃ,xx🔩 Step #5: 43M,,YOT,eXod Step #5: a3A,bc,C,pH,jD Step #5: vVqY,ÃodZ95T,SdQtP5,z Step #5: 9m🔗🪛🔗Lmbv Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,6", "-d,", "-c3"] Step #5: Step #5: Running test ["cut", "nSaPNQ30QvpS", "-d,Z"] Step #5: === Compare result for: cut ["nSaPNQ30QvpS", "-d,Z"] Step #5: Pipe: E Step #5: j,,à Step #5: 3nHYV⚙ÃP,⚙q,9K9,B,w Step #5: V,S(27L,1Ãsgf,UbB, Step #5: 7RÃ,He🧰🔗 Step #5: ,OEgjsY,uMSen,WNPD🔩B5🧰 Step #5: LzEV6cyx,JJ⚙,,Am(, Step #5: (N6f Step #5: ⚙,mYrrrxe,pQ Step #5: ,🪛prf1A,dtJYH⚙🧰,2v(h🔗Ir Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["nSaPNQ30QvpS", "-d,Z"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: LÃ,,(lYdÃ7,l(kMqBYJa, Step #5: mCse2Vo1e,wutLd,m3OMUll Step #5: ,ÃJR Step #5: ,g,G Step #5: JÃCT,M8eI🔩j Step #5: ys Step #5: M⚙(🔗49Hw,o,, Step #5: ,0ST(X,🪓,, Step #5: ,8Th Step #5: ⚙rdcw1 Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-b8", "os0", "-d,f"] Step #5: === Compare result for: cut ["-b8", "os0", "-d,f"] Step #5: Pipe: LKP7a,8Ji Step #5: K,e,, Step #5: S,(sPE,(,X4L,usj Step #5: ÃhO7 Step #5: T,gyY,Ja,( Step #5: 4eHFq,JSc,,t(7JoÃ5r6 Step #5: (2u,,xI6T,N1,🪛Fc7 Step #5: x,b,o,F Step #5: 4m,U Step #5: IyJ Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b8", "os0", "-d,f"] Step #5: Step #5: Running test ["cut", "-c10", "-d,", "-f5", "-d,j", "-d,", "-f2"] Step #5: === Compare result for: cut ["-c10", "-d,", "-f5", "-d,j", "-d,", "-f2"] Step #5: Pipe: D8kvBFJ2,,asOQm3X5p, Step #5: NÃE,,Y,s,PJpVm️T Step #5: Ãid🪓dB🪓,,J🔗7ve,nW Step #5: fHPjL,,OamO,V Step #5: T️jb(⚙M,zR2 Step #5: eb Step #5: qi,iRlt((8 Step #5: h,K🪓M,e(r Step #5: 7,34W,v8sH️F(NJR, Step #5: 🧰🪓🔗Io,bP⚙,m4lÃ,pN Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c10", "-d,", "-f5", "-d,j", "-d,", "-f2"] Step #5: Step #5: Running test ["cut", "-b7", "-b1", "-f4"] Step #5: === Compare result for: cut ["-b7", "-b1", "-f4"] Step #5: Pipe: pY,s, Step #5: 🪓,LP,3 Step #5: a39G🪛,h,Y(gwr🔩w(,v Step #5: y4,, Step #5: 1i,R Step #5: mtA🔩jR Step #5: n2vqv,kKq🔩o(yza,sÃs Step #5: 52v,0,🧰,T🪓Ij,rM4 Step #5: k55ebÃI,,️y2,Q, Step #5: 3,ÃMd(m,HHff,RB Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b7", "-b1", "-f4"] Step #5: Step #5: Running test ["cut", "-f1", "-d,J", "-c6", "-b5", "Ug3u(TnSWaNuÃX(g"] Step #5: === Compare result for: cut ["-f1", "-d,J", "-c6", "-b5", "Ug3u(TnSWaNuÃX(g"] Step #5: Pipe: Ml,RSkDd,V5gdz,(,dq Step #5: EGEdTÃ(,,,p⚙ Step #5: R🔩,b Step #5: (,GÃG, Step #5: klR🪓,c Step #5: hc,j,BV,,NJ3 Step #5: rgL,W6z9,q,Gx🪛y(y Step #5: ,N,0Z,️(ZXWcRy,🔗xv6à Step #5: sA🧰j,Ãa Step #5: z Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-d,J", "-c6", "-b5", "Ug3u(TnSWaNuÃX(g"] Step #5: Step #5: Running test ["cut", "-b1"] Step #5: === Compare result for: cut ["-b1"] Step #5: Pipe: BHfÃ,🔩y⚙f5UÃ(,S,tB,B🧰 Step #5: ,538,,m1ÃR(⚙c Step #5: l,GL,a, Step #5: d0,Liy2ur9, Step #5: Mr,,xw🧰5ÃE,o,U Step #5: U6 Step #5: uDyfCJ3,VÃk🪓🪓2 Step #5: ,4J0aZwrsJ,s(FjYNVeV,ZX,plNoxwN Step #5: e,,u🧰48️,bA🧰8np🔩🪓,D72 Step #5: ILe Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,", "-f4", "-f2", "-c6"] Step #5: === Compare result for: cut ["-d,", "-f4", "-f2", "-c6"] Step #5: Pipe: Step #5: A30,,,M Step #5: m,O,o🧰(,LDXfSm2CU⚙ Step #5: 🧰BI,O(🪓 Step #5: ZNZHBm, Step #5: h,t,A🔗(z7y Step #5: Ã(XY(,,Kor Step #5: 5i,(🧰,n Step #5: Xl8,🪛j(BÃ,fznY,,️7 Step #5: K, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-f4", "-f2", "-c6"] Step #5: Step #5: Running test ["cut", "-f1", "-d,("] Step #5: === Compare result for: cut ["-f1", "-d,("] Step #5: Pipe: ,t,W,ÃiWDBJ,P Step #5: Step #5: Step #5: ffE,z,KO(,s Step #5: d Step #5: ,(L,hJy🧰 Step #5: ASe,v Step #5: BC Step #5: Bx(o,u,o,uw,ey Step #5: KÃ,(k1,4XKo,ÃaOd,t27🔩wiBJMe Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-d,("] Step #5: Step #5: Running test ["cut", "-f3", "-b1", "-c5", "-d,", "-f4"] Step #5: === Compare result for: cut ["-f3", "-b1", "-c5", "-d,", "-f4"] Step #5: Pipe: (🪛,G Step #5: ,Ã🧰vv🪓🪛dtl,, Step #5: 🪛NN7d Step #5: Hr,H Step #5: OXqm,c Step #5: u🧰T🧰bG⚙ÃJ,x8sZlA,CELGk,,uÃb Step #5: Z0S🔗Up,vqel9C,🔗VE,pt🔩5Tg Step #5: ,,,oV,(f Step #5: (4H⚙🔩🔗Q,,,k,WzTp Step #5: Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f3", "-b1", "-c5", "-d,", "-f4"] Step #5: Step #5: Running test ["cut", "c⚙n🪓uZ(ÃP", "🪓i7"] Step #5: === Compare result for: cut ["c⚙n🪓uZ(ÃP", "🪓i7"] Step #5: Pipe: GJY,4MKhWF,🪛 Step #5: Gw,(️(P️s🪛,h,,Ru Step #5: 6,lCiHÃ(C,,4y Step #5: QEÃS,Ã,9,,JCà Step #5: 69🔩,🪛JiH,IQBC(6w Step #5: 🪛4t,ZE(,bt7UC Step #5: Xe3LIDhS,QRbb9lf🔗,oReOaZvO,pM,nYAn Step #5: ,F15v,nYhrR(L,v Step #5: Step #5: w,(R,Gs️Z3,🔗, Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["c⚙n🪓uZ(ÃP", "🪓i7"] Step #5: Step #5: Running test ["cut", "-b7", "D", "-c3"] Step #5: === Compare result for: cut ["-b7", "D", "-c3"] Step #5: Pipe: XNceI,w Step #5: ,b(m⚙v,RS(ÃW Step #5: F️(i81,,( Step #5: ,i(🔩,(J,y⚙w️UkE Step #5: Step #5: k🧰0,h⚙zm🪓s Step #5: dÃN(srUNi,m,9D,g🪓(8oj Step #5: O🧰,XpI(R Step #5: ÃtuÃk, Step #5: 3te,l🧰9E,T Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b7", "D", "-c3"] Step #5: Step #5: Running test ["cut", "-f2"] Step #5: === Compare result for: cut ["-f2"] Step #5: Pipe: Isp️HD,,3 Step #5: M,Fs6a,T,,iq Step #5: B,lb,Tpdr,bQh, Step #5: 🔗i Step #5: CÃplS,(zA,NF( Step #5: ,TU,⚙,Rà Step #5: Y,G6 Step #5: ,24ooqx,Ij Step #5: ,,ba, Step #5: D,,fKà Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-d,1", "tZ", "-d,", "-f4"] Step #5: === Compare result for: cut ["-d,1", "tZ", "-d,", "-f4"] Step #5: Pipe: ,R,,,U🧰ÃY Step #5: sSÃ,w Step #5: ,,0🧰Z2I3u⚙Q,, Step #5: b️,sQl,T️ Step #5: ,I,f,0,Azry Step #5: Ni9B,sZ🧰gP,Y,TD0 Step #5: (,,Aqc,, Step #5: 🧰,o Step #5: tXjqknO⚙,5Q,VaÃUfu Step #5: ,,9p Step #5: Rust stderr: Step #5: tZ: No such file or directory Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -tZ: No such file or directory Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,1", "tZ", "-d,", "-f4"] Step #5: Step #5: Running test ["cut", "-d,y", "-c2"] Step #5: === Compare result for: cut ["-d,y", "-c2"] Step #5: Pipe: g,jf Step #5: Hk,️eB, Step #5: XEm,🪛 Step #5: a🧰T3,V️(lN Step #5: IWr,x9g,wG⚙, Step #5: E,VoS,2🔗Ã,lGpIh Step #5: Step #5: Sx,,(x Step #5: ,5,1Gs Step #5: m,J(GÃ,4N,J0,KOFJODw Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,y", "-c2"] Step #5: Step #5: Running test ["cut", "-c7"] Step #5: === Compare result for: cut ["-c7"] Step #5: Pipe: G,q,z,g,5 Step #5: 🪛ÃZ,aK Step #5: VNxiXGvZUe Step #5: 1M,,Mc(YJ,,4l6l⚙A Step #5: W,Ã,6akKb,aZcU,H Step #5: EbxBH,zÃCb(7u,dP🔩q🪛1CI, Step #5: miDB Step #5: (Q3I,f🔗,Ã🔗, Step #5: n,(I,hÃ🔩T8Q,Q2GT Step #5: Y🪛gq🧰,z33,m Step #5: === OK Same behavior Step #5: Step #5: Running test ["cut", "-b1", "-f4"] Step #5: === Compare result for: cut ["-b1", "-f4"] Step #5: Pipe: Ãp Step #5: c3🪓,,s,(VD,Sxu🪓( Step #5: WO,S2r,,cÃ🧰73🔩b Step #5: lZ9F,8HÃ,z🪛7 Step #5: ,,B,0dYA6hi8 Step #5: (,rA Step #5: , Step #5: va Step #5: (,wX,,s,8Nf Step #5: muuR🧰cGn Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b1", "-f4"] Step #5: Step #5: Running test ["cut", "-b2", "-c2", "-b10", "-b3", "-f4", "-d,"] Step #5: === Compare result for: cut ["-b2", "-c2", "-b10", "-b3", "-f4", "-d,"] Step #5: Pipe: 9,Y,🪛h,Q⚙0aHEE, Step #5: 0zf,,JC Step #5: Fr Step #5: (,,,B Step #5: hRZ(,J Step #5: 7KH,Ã2EuBz,⚙lÃlBXA,z,z( Step #5: VlpJPÃQdY,9a Step #5: K(Ã,oDÃZiA,JN Step #5: U,b,yHigQH Step #5: y(,u🔗y,eVFz🔗,mS(X Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b2", "-c2", "-b10", "-b3", "-f4", "-d,"] Step #5: Step #5: Running test ["cut", "-b6", "-c5"] Step #5: === Compare result for: cut ["-b6", "-c5"] Step #5: Pipe: ,(4fIN(bc,,B Step #5: EFLu,z(R3,R Step #5: y,JTL Step #5: 5B,ne🪓XÃTÃ,RFÃ,a Step #5: ,QKÃy,,82,MYWENWHX Step #5: ,1YOZEM,d Step #5: M🪓ku,olhqq,0,🪛O6T,9o Step #5: ,(ZH🪛 Step #5: u🪓gI🔗,Ã,ÃY,ltu9 Step #5: K,0YNe5,lOjc,(GU Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b6", "-c5"] Step #5: Step #5: Running test ["cut", "a0yMWfC", "-c1", "-d,Q", "-b5"] Step #5: === Compare result for: cut ["a0yMWfC", "-c1", "-d,Q", "-b5"] Step #5: Pipe: ByiN,zG Step #5: YWu,83,n Step #5: 9WY1z,,5l(lC(h,(vuA(🔗i,GÃQÃFS Step #5: IÃ(x,L,,eaAs,n Step #5: 8yg(,Q(️,r,nLjLIUÃG(,(rfQw0 Step #5: ,LEà Step #5: g,( Step #5: ÃA🧰y,PY Step #5: AGc,RR,,BÃdKT(,X Step #5: ,eFZ3ZsÃu,Hb, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["a0yMWfC", "-c1", "-d,Q", "-b5"] Step #5: Step #5: Running test ["cut"] Step #5: === Compare result for: cut [] Step #5: Pipe: ,nyJ,qEzce Step #5: 3ÃJ⚙rHj2,🧰,MP,S🧰TÃ8h6iWc,MCm Step #5: , Step #5: 7,(4 Step #5: YtF,ÃUtiS,V4 Step #5: ,p,🪛4(k,qp0BA,4ZSRj Step #5: ou,🪛ZWHk⚙Ãg,xX,X1KC Step #5: IezUu Step #5: EK🪓44,dHzyq, Step #5: JfpgWm,🔩Y️️,z,,🪓Y Step #5: Rust stderr: Step #5: cut-error-missing-mode-arg Step #5: GNU stderr: Step #5: you must specify a list of bytes, characters, or fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-missing-mode-arg Step #5: +you must specify a list of bytes, characters, or fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut [] Step #5: Step #5: Running test ["cut", "-b9", "-c9"] Step #5: === Compare result for: cut ["-b9", "-c9"] Step #5: Pipe: N5,qodj🔗, Step #5: xK,,Ã97 Step #5: V5K⚙TU Step #5: k Step #5: olLwG,d🧰(WÃ,W,FeVL,bG4e(e Step #5: 4f4oJWE Step #5: PkZ Step #5: ,(N Step #5: Y Step #5: eca,FAP,S(🪓Ka4 Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b9", "-c9"] Step #5: Step #5: Running test ["cut", "-d,K", "-c10", "-f1"] Step #5: === Compare result for: cut ["-d,K", "-c10", "-f1"] Step #5: Pipe: ÃpEeYM,🪓xf Step #5: N,m,8jc Step #5: cnylHnq,C,l,9🪓kB Step #5: 8QR🪓2,XbVaI,,,CÃQc Step #5: KLC,m,F Step #5: Step #5: Bk Step #5: ,5Pq2yd,S,(,Ã9🔗 Step #5: tK Step #5: N,mU, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,K", "-c10", "-f1"] Step #5: Step #5: Running test ["cut", "-d,", "-d,", "-c8"] Step #5: === Compare result for: cut ["-d,", "-d,", "-c8"] Step #5: Pipe: kEBmFPu,kO,, Step #5: ,4X🔗ÃVOU2I,🔗 Step #5: mÃK️CVJ9,tSDF Step #5: ÃP,g,8(z,z🔩0 Step #5: T,,0 Step #5: (ueQxFg Step #5: p6wOlZzXF,U4 Step #5: l,(diVPa,((pm, Step #5: E(3(x,9F,(H3,bisf3(️ Step #5: nW3F((N,ÃÃS,u, Step #5: Rust stderr: Step #5: cut-error-delimiter-only-with-fields Step #5: GNU stderr: Step #5: an input delimiter may be specified only when operating on fields Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-only-with-fields Step #5: +an input delimiter may be specified only when operating on fields Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-d,", "-c8"] Step #5: Step #5: Running test ["cut", "-b5", "-d,", "-d,⚙"] Step #5: === Compare result for: cut ["-b5", "-d,", "-d,⚙"] Step #5: Pipe: ÃO8S Step #5: hKE(,,khlY2(yC Step #5: J,(5lÃF,🔗6 Step #5: XEWYg,cÃ,F3W,n Step #5: (,k,9e(p🧰oJJM,D,🔩voJ( Step #5: qÃÃ🪓btS,9e,tNEGÃPo,(05k Step #5: gvrm1E,( Step #5: 🪛F🔗Ã,8Y,,yZd Step #5: zG,,Dx(2mk6tw3,7i7St Step #5: 4,️DgaÃ,, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-b5", "-d,", "-d,⚙"] Step #5: Step #5: Running test ["cut", "-d,V", "-f1", "XgMEp\u{fe0f}zMÃu4LW2", "(ZST", "-b7"] Step #5: === Compare result for: cut ["-d,V", "-f1", "XgMEp\u{fe0f}zMÃu4LW2", "(ZST", "-b7"] Step #5: Pipe: (vOà Step #5: (3XxgZ⚙GVV,9OcfJ,C,,Dl Step #5: Step #5: , Step #5: ️S,t,Z🧰z,i,Jy Step #5: v8🧰,,,r(,Vv Step #5: Gn,5, Step #5: nC,,8ÃZT,5️ZfÃVÃI, Step #5: Step #5: (, Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: the delimiter must be a single character Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +the delimiter must be a single character Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,V", "-f1", "XgMEp\u{fe0f}zMÃu4LW2", "(ZST", "-b7"] Step #5: Step #5: Running test ["cut", "-f1", "-c3"] Step #5: === Compare result for: cut ["-f1", "-c3"] Step #5: Pipe: mz,5,c7,,cPSÃ⚙ZqA Step #5: HM Step #5: hE4xK(,⚙id(X,hUR7KL,M Step #5: AG Step #5: D,Ã63t,, Step #5: ,i4(,aN4k Step #5: ,ntzI7,NyU2Q,G🔗🪓yY Step #5: y,lg1w(,U2( Step #5: eUL,(LTkaT(,,7à Step #5: ,W,au6R6NBkd,E,P Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-c3"] Step #5: Step #5: Running test ["cut", "-d,", "-f3", "-f3", "n(🪓HÃBf"] Step #5: === Compare result for: cut ["-d,", "-f3", "-f3", "n(🪓HÃBf"] Step #5: Pipe: S(X🔩(KW Step #5: ( Step #5: e, Step #5: yHh,Sxà Step #5: ️9(ÃBr,,Ãn,SS Step #5: cvbQ,CAABAVeGEu,I,g(mP,Tg9ÃSYu Step #5: o(t(🧰🧰,b Step #5: 🔩CmKVS Step #5: Ã(🧰L(ÃÃb,🧰,YÃv9v5(,n Step #5: ((5((b,aD0,🪛, Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-d,", "-f3", "-f3", "n(🪓HÃBf"] Step #5: Step #5: Running test ["cut", "-f1", "-b9", "KT\u{fe0f}Gtl"] Step #5: === Compare result for: cut ["-f1", "-b9", "KT\u{fe0f}Gtl"] Step #5: Pipe: Ãc9FcJE(F,DH,⚙,fN, Step #5: 🔗(ÃyÃRG,t,u Step #5: zmX1y,mkTQx,Agt9🔩 Step #5: Ã8⚙3blp, Step #5: (BNpÃ,zPvv️w5d,m7,tpD, Step #5: 4gL Step #5: yd️I🔩 Step #5: h,g,à Step #5: ,1🔩,bYZ,h1pkcxA9,M Step #5: 9NuÃ,3x(cre,(zÃY,K🪓ÃB6Anc🪛z,JEeF1(XX Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f1", "-b9", "KT\u{fe0f}Gtl"] Step #5: Step #5: #64 pulse exec/s: 0 rss: 30Mb Step #5: Running test ["cut", "js3cNr2uÃ🧰sS", "-f5", "-f4", "-d,q"] Step #5: === Compare result for: cut ["js3cNr2uÃ🧰sS", "-f5", "-f4", "-d,q"] Step #5: Pipe: Pc,SJu Step #5: T,,oW(OL,⚙ksll(, Step #5: CfnYÃMh🔗,0B,fR,3ÃYÃ6à Step #5: t Step #5: n,l( Step #5: Hi1️9 Step #5: 🧰Ã,,ui4 Step #5: XÃiafFW🔗 Step #5: Step #5: o9LAMg,,O(xWGjE3 Step #5: Rust stderr: Step #5: cut-error-delimiter-must-be-single-character Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-delimiter-must-be-single-character Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["js3cNr2uÃ🧰sS", "-f5", "-f4", "-d,q"] Step #5: Step #5: Running test ["cut", "-f5", "-f5", "-d,"] Step #5: === Compare result for: cut ["-f5", "-f5", "-d,"] Step #5: Pipe: z,Wm,e️,cB9, Step #5: 🧰m⚙aK,,0(k Step #5: j,,m,(8🔗M Step #5: (,KoEYm5KSV,80qsq,TciQ🔩E7 Step #5: ,j Step #5: k3,,nM,n⚙(jg,️ Step #5: Yah Step #5: 2O,4r,eT(ghW4Jx Step #5: ,P🔩ghrQ,1 Step #5: 5qh🪓XÃ,U🔗J Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-f5", "-f5", "-d,"] Step #5: Step #5: Running test ["cut", "-c8", "-c9", "-c4", "-c3", "-f4", "-b6"] Step #5: === Compare result for: cut ["-c8", "-c9", "-c4", "-c3", "-f4", "-b6"] Step #5: Pipe: (pà Step #5: bkÃqx(,g,yIRt,IG, Step #5: ÃuUWU1,,dUtF,h3 Step #5: Q Step #5: FOAzw Step #5: u(,eo,UGh6 Step #5: ,PC8 Step #5: A Step #5: rw Step #5: U🪓cL,Q698G Step #5: Rust stderr: Step #5: cut-error-multiple-mode-args Step #5: GNU stderr: Step #5: only one type of list may be specified Step #5: Try 'cut --help' for more information. Step #5: --- START diff Step #5: -cut-error-multiple-mode-args Step #5: +only one type of list may be specified Step #5: +Try 'cut --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cut ["-c8", "-c9", "-c4", "-c3", "-f4", "-b6"] Step #5: Step #5: #67 DONE exec/s: 0 rss: 33Mb Step #5: MERGE-OUTER: successful in 2 attempt(s) Step #5: MERGE-OUTER: the control file has 27857 bytes Step #5: MERGE-OUTER: consumed 0Mb (26Mb rss) to parse the control file Step #5: MERGE-OUTER: 0 new files with 0 new features added; 0 new coverage edges Step #5: [2025-11-03 06:53:53,108 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:53,118 INFO] Finished finding shared libraries for targets. Step #5: [2025-11-03 06:53:53,118 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:53,126 INFO] Finished finding shared libraries for targets. Step #5: [2025-11-03 06:53:53,299 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:53,307 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_split_error.log Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_cut_error.log Step #5: [2025-11-03 06:53:53,575 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:53,584 INFO] Finished finding shared libraries for targets. Step #5: Error occured while running fuzz_cksum: Step #5: Cov returncode: 0, grep returncode: 0 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 764909594 Step #5: MERGE-OUTER: 424 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 764918854 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: 424 total files; 0 processed earlier; will process 424 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/kzhyddmyzt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/kzhyddmyzt"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/kzhyddmyzt"] Step #5: Rust stderr: Step #5: /tmp/kzhyddmyzt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kzhyddmyzt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/kzhyddmyzt"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sha256", "/tmp/egqujnbgeg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sha256", "/tmp/egqujnbgeg"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sha256", "/tmp/egqujnbgeg"] Step #5: Rust stderr: Step #5: /tmp/egqujnbgeg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/egqujnbgeg: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sha256", "/tmp/egqujnbgeg"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "md5", "/tmp/vrsfgjgdip"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "md5", "/tmp/vrsfgjgdip"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "md5", "/tmp/vrsfgjgdip"] Step #5: Rust stderr: Step #5: /tmp/vrsfgjgdip: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vrsfgjgdip: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "md5", "/tmp/vrsfgjgdip"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "md5", "/tmp/zfqiaiijto"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "md5", "/tmp/zfqiaiijto"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "md5", "/tmp/zfqiaiijto"] Step #5: Rust stderr: Step #5: /tmp/zfqiaiijto: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zfqiaiijto: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "md5", "/tmp/zfqiaiijto"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--untagged", "-c", "/tmp/ieehgaxuvv", "-a", "sysv", "/tmp/gyxnsbvcgz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "/tmp/ieehgaxuvv", "-a", "sysv", "/tmp/gyxnsbvcgz"] Step #5: === Compare result for: cksum ["--untagged", "-c", "/tmp/ieehgaxuvv", "-a", "sysv", "/tmp/gyxnsbvcgz"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "/tmp/ieehgaxuvv", "-a", "sysv", "/tmp/gyxnsbvcgz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/rmxksqkhwo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/rmxksqkhwo"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/rmxksqkhwo"] Step #5: Rust stderr: Step #5: /tmp/rmxksqkhwo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rmxksqkhwo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/rmxksqkhwo"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha1", "/tmp/dhbmesjxoq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha1", "/tmp/dhbmesjxoq"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha1", "/tmp/dhbmesjxoq"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha1", "/tmp/dhbmesjxoq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/vxinfgsvbc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/vxinfgsvbc"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/vxinfgsvbc"] Step #5: Rust stderr: Step #5: /tmp/vxinfgsvbc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vxinfgsvbc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/vxinfgsvbc"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/rnoqxfmeji"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/rnoqxfmeji"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/rnoqxfmeji"] Step #5: Rust stderr: Step #5: /tmp/rnoqxfmeji: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rnoqxfmeji: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/rnoqxfmeji"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "128", "-c", "/tmp/yvfkrdqnsz", "-a", "sha512", "/tmp/cxfoegueap"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "128", "-c", "/tmp/yvfkrdqnsz", "-a", "sha512", "/tmp/cxfoegueap"] Step #5: === Compare result for: cksum ["-l", "128", "-c", "/tmp/yvfkrdqnsz", "-a", "sha512", "/tmp/cxfoegueap"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "128", "-c", "/tmp/yvfkrdqnsz", "-a", "sha512", "/tmp/cxfoegueap"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/dkkxdadunp", "-a", "md5", "/tmp/yrmduyiwfi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/dkkxdadunp", "-a", "md5", "/tmp/yrmduyiwfi"] Step #5: === Compare result for: cksum ["-c", "/tmp/dkkxdadunp", "-a", "md5", "/tmp/yrmduyiwfi"] Step #5: Rust stderr: Step #5: /tmp/dkkxdadunp: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/yrmduyiwfi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dkkxdadunp: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/yrmduyiwfi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/dkkxdadunp", "-a", "md5", "/tmp/yrmduyiwfi"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/aqdkxohsmr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/aqdkxohsmr"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/aqdkxohsmr"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/aqdkxohsmr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/dwyfrcbfcm", "-a", "sha224", "/tmp/nqgsvvopxs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/dwyfrcbfcm", "-a", "sha224", "/tmp/nqgsvvopxs"] Step #5: === Compare result for: cksum ["-c", "/tmp/dwyfrcbfcm", "-a", "sha224", "/tmp/nqgsvvopxs"] Step #5: Rust stderr: Step #5: /tmp/dwyfrcbfcm: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/nqgsvvopxs: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dwyfrcbfcm: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/nqgsvvopxs: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/dwyfrcbfcm", "-a", "sha224", "/tmp/nqgsvvopxs"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "457", "-c", "-a", "md5", "/tmp/ranzbdsmnu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "457", "-c", "-a", "md5", "/tmp/ranzbdsmnu"] Step #5: === Compare result for: cksum ["-l", "457", "-c", "-a", "md5", "/tmp/ranzbdsmnu"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "457", "-c", "-a", "md5", "/tmp/ranzbdsmnu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/aylulsltqt", "-a", "sha224", "/tmp/gwavxrmmyq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/aylulsltqt", "-a", "sha224", "/tmp/gwavxrmmyq"] Step #5: === Compare result for: cksum ["-c", "/tmp/aylulsltqt", "-a", "sha224", "/tmp/gwavxrmmyq"] Step #5: Rust stderr: Step #5: /tmp/aylulsltqt: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/gwavxrmmyq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/aylulsltqt: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/gwavxrmmyq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/aylulsltqt", "-a", "sha224", "/tmp/gwavxrmmyq"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "crc", "/tmp/sqglywoiea"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "crc", "/tmp/sqglywoiea"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "crc", "/tmp/sqglywoiea"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "crc", "/tmp/sqglywoiea"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha512", "--raw", "-c", "-a", "blake2b", "/tmp/gqsxzsvgby"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "--raw", "-c", "-a", "blake2b", "/tmp/gqsxzsvgby"] Step #5: === Compare result for: cksum ["-a", "sha512", "--raw", "-c", "-a", "blake2b", "/tmp/gqsxzsvgby"] Step #5: Rust stderr: Step #5: /tmp/gqsxzsvgby: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gqsxzsvgby: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "--raw", "-c", "-a", "blake2b", "/tmp/gqsxzsvgby"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/fxlygtyaeb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/fxlygtyaeb"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/fxlygtyaeb"] Step #5: Rust stderr: Step #5: /tmp/fxlygtyaeb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fxlygtyaeb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/fxlygtyaeb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/bcdgytzzvd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/bcdgytzzvd"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/bcdgytzzvd"] Step #5: Rust stderr: Step #5: /tmp/bcdgytzzvd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bcdgytzzvd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/bcdgytzzvd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/cwslgmjsku", "-a", "blake2b", "/tmp/vuynddzjxk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/cwslgmjsku", "-a", "blake2b", "/tmp/vuynddzjxk"] Step #5: === Compare result for: cksum ["-c", "/tmp/cwslgmjsku", "-a", "blake2b", "/tmp/vuynddzjxk"] Step #5: Rust stderr: Step #5: /tmp/cwslgmjsku: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/vuynddzjxk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cwslgmjsku: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/vuynddzjxk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/cwslgmjsku", "-a", "blake2b", "/tmp/vuynddzjxk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/dacfdfdzqv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/dacfdfdzqv"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/dacfdfdzqv"] Step #5: Rust stderr: Step #5: /tmp/dacfdfdzqv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dacfdfdzqv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/dacfdfdzqv"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/rofweeqzbq", "-a", "crc", "/tmp/xlzjlafznp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/rofweeqzbq", "-a", "crc", "/tmp/xlzjlafznp"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/rofweeqzbq", "-a", "crc", "/tmp/xlzjlafznp"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/rofweeqzbq", "-a", "crc", "/tmp/xlzjlafznp"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-l", "250", "-c", "-a", "crc", "/tmp/zhqnyzircm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-l", "250", "-c", "-a", "crc", "/tmp/zhqnyzircm"] Step #5: === Compare result for: cksum ["--base64", "-l", "250", "-c", "-a", "crc", "/tmp/zhqnyzircm"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-l", "250", "-c", "-a", "crc", "/tmp/zhqnyzircm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/uqhdtkqwlv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/uqhdtkqwlv"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/uqhdtkqwlv"] Step #5: Rust stderr: Step #5: /tmp/uqhdtkqwlv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uqhdtkqwlv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/uqhdtkqwlv"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha256", "/tmp/goqfoaodmo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha256", "/tmp/goqfoaodmo"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha256", "/tmp/goqfoaodmo"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha256", "/tmp/goqfoaodmo"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "sha384", "/tmp/tyejwxcuzy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "sha384", "/tmp/tyejwxcuzy"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "sha384", "/tmp/tyejwxcuzy"] Step #5: Rust stderr: Step #5: /tmp/tyejwxcuzy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tyejwxcuzy: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "sha384", "/tmp/tyejwxcuzy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/fenpwimvwr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/fenpwimvwr"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/fenpwimvwr"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/fenpwimvwr"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "crc", "/tmp/atausmfpkm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "crc", "/tmp/atausmfpkm"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "crc", "/tmp/atausmfpkm"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "crc", "/tmp/atausmfpkm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/tezbgkclfo", "-a", "sha384", "/tmp/whrvectxzd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/tezbgkclfo", "-a", "sha384", "/tmp/whrvectxzd"] Step #5: === Compare result for: cksum ["-c", "/tmp/tezbgkclfo", "-a", "sha384", "/tmp/whrvectxzd"] Step #5: Rust stderr: Step #5: /tmp/tezbgkclfo: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/whrvectxzd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tezbgkclfo: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/whrvectxzd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/tezbgkclfo", "-a", "sha384", "/tmp/whrvectxzd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/gylgmgudcf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/gylgmgudcf"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/gylgmgudcf"] Step #5: Rust stderr: Step #5: /tmp/gylgmgudcf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gylgmgudcf: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/gylgmgudcf"] Step #5: Step #5: === TEST cksum ["cksum", "file_Zog"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_Zog"] Step #5: === Compare result for: cksum ["file_Zog"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "blake2b", "/tmp/ybummnyyws"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "blake2b", "/tmp/ybummnyyws"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "blake2b", "/tmp/ybummnyyws"] Step #5: Rust stderr: Step #5: /tmp/ybummnyyws: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ybummnyyws: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "blake2b", "/tmp/ybummnyyws"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/vcgufpyezk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/vcgufpyezk"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/vcgufpyezk"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/vcgufpyezk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/vtkbkwqhps", "-a", "md5", "/tmp/vchabncmlc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/vtkbkwqhps", "-a", "md5", "/tmp/vchabncmlc"] Step #5: === Compare result for: cksum ["-c", "/tmp/vtkbkwqhps", "-a", "md5", "/tmp/vchabncmlc"] Step #5: Rust stderr: Step #5: /tmp/vtkbkwqhps: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/vchabncmlc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vtkbkwqhps: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/vchabncmlc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/vtkbkwqhps", "-a", "md5", "/tmp/vchabncmlc"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/upjvbnsicp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/upjvbnsicp"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/upjvbnsicp"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/upjvbnsicp"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/reyarrmudu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/reyarrmudu"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/reyarrmudu"] Step #5: Rust stderr: Step #5: /tmp/reyarrmudu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/reyarrmudu: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/reyarrmudu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/snvzhyqzlv", "-a", "bsd", "/tmp/izsdfhrnai"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/snvzhyqzlv", "-a", "bsd", "/tmp/izsdfhrnai"] Step #5: === Compare result for: cksum ["-c", "/tmp/snvzhyqzlv", "-a", "bsd", "/tmp/izsdfhrnai"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/snvzhyqzlv", "-a", "bsd", "/tmp/izsdfhrnai"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "--untagged", "-l", "95", "-c", "-a", "md5", "/tmp/ninecwsrnk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "--untagged", "-l", "95", "-c", "-a", "md5", "/tmp/ninecwsrnk"] Step #5: === Compare result for: cksum ["-a", "sha512", "--untagged", "-l", "95", "-c", "-a", "md5", "/tmp/ninecwsrnk"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "--untagged", "-l", "95", "-c", "-a", "md5", "/tmp/ninecwsrnk"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "195", "-c", "-a", "sha1", "/tmp/pacqikrhxh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "195", "-c", "-a", "sha1", "/tmp/pacqikrhxh"] Step #5: === Compare result for: cksum ["-l", "195", "-c", "-a", "sha1", "/tmp/pacqikrhxh"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "195", "-c", "-a", "sha1", "/tmp/pacqikrhxh"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "156", "-c", "/tmp/lfgwwgxzgm", "-a", "sysv", "/tmp/fkuypdhtmi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "156", "-c", "/tmp/lfgwwgxzgm", "-a", "sysv", "/tmp/fkuypdhtmi"] Step #5: === Compare result for: cksum ["-l", "156", "-c", "/tmp/lfgwwgxzgm", "-a", "sysv", "/tmp/fkuypdhtmi"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "156", "-c", "/tmp/lfgwwgxzgm", "-a", "sysv", "/tmp/fkuypdhtmi"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha1", "/tmp/vcolyoqkhr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha1", "/tmp/vcolyoqkhr"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha1", "/tmp/vcolyoqkhr"] Step #5: Rust stderr: Step #5: /tmp/vcolyoqkhr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vcolyoqkhr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha1", "/tmp/vcolyoqkhr"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sysv", "/tmp/cxtwpyosyv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sysv", "/tmp/cxtwpyosyv"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sysv", "/tmp/cxtwpyosyv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sysv", "/tmp/cxtwpyosyv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "crc", "/tmp/vovtswehph"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "crc", "/tmp/vovtswehph"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "crc", "/tmp/vovtswehph"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "crc", "/tmp/vovtswehph"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "blake2b", "/tmp/piwlputwub"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "blake2b", "/tmp/piwlputwub"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "blake2b", "/tmp/piwlputwub"] Step #5: Rust stderr: Step #5: /tmp/piwlputwub: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/piwlputwub: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "blake2b", "/tmp/piwlputwub"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/gchexqkaxw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/gchexqkaxw"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/gchexqkaxw"] Step #5: Rust stderr: Step #5: /tmp/gchexqkaxw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gchexqkaxw: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/gchexqkaxw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/dqknyazhgx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/dqknyazhgx"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/dqknyazhgx"] Step #5: Rust stderr: Step #5: /tmp/dqknyazhgx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dqknyazhgx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/dqknyazhgx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "/tmp/qxjkzvhnyw", "-a", "sha384", "/tmp/zjdyhwicxx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "/tmp/qxjkzvhnyw", "-a", "sha384", "/tmp/zjdyhwicxx"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "/tmp/qxjkzvhnyw", "-a", "sha384", "/tmp/zjdyhwicxx"] Step #5: Rust stderr: Step #5: /tmp/qxjkzvhnyw: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/zjdyhwicxx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qxjkzvhnyw: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/zjdyhwicxx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "/tmp/qxjkzvhnyw", "-a", "sha384", "/tmp/zjdyhwicxx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "-a", "blake2b", "/tmp/childgcemk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "-a", "blake2b", "/tmp/childgcemk"] Step #5: === Compare result for: cksum ["-a", "sha384", "-c", "-a", "blake2b", "/tmp/childgcemk"] Step #5: Rust stderr: Step #5: /tmp/childgcemk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/childgcemk: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "-c", "-a", "blake2b", "/tmp/childgcemk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/rnvuuwzusx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/rnvuuwzusx"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/rnvuuwzusx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/rnvuuwzusx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "-a", "sha1", "/tmp/kwmmjpmbhk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "-a", "sha1", "/tmp/kwmmjpmbhk"] Step #5: === Compare result for: cksum ["-a", "sha384", "-c", "-a", "sha1", "/tmp/kwmmjpmbhk"] Step #5: Rust stderr: Step #5: /tmp/kwmmjpmbhk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kwmmjpmbhk: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "-c", "-a", "sha1", "/tmp/kwmmjpmbhk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/ftjakukcyh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/ftjakukcyh"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/ftjakukcyh"] Step #5: Rust stderr: Step #5: /tmp/ftjakukcyh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ftjakukcyh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/ftjakukcyh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/cprufavffc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/cprufavffc"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/cprufavffc"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/cprufavffc"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "470", "-c", "-a", "crc", "/tmp/dseobmiddi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "470", "-c", "-a", "crc", "/tmp/dseobmiddi"] Step #5: === Compare result for: cksum ["-l", "470", "-c", "-a", "crc", "/tmp/dseobmiddi"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "470", "-c", "-a", "crc", "/tmp/dseobmiddi"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sha512", "/tmp/ljksdcduno"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sha512", "/tmp/ljksdcduno"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sha512", "/tmp/ljksdcduno"] Step #5: Rust stderr: Step #5: /tmp/ljksdcduno: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ljksdcduno: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sha512", "/tmp/ljksdcduno"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/azadfcbftg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/azadfcbftg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/azadfcbftg"] Step #5: Rust stderr: Step #5: /tmp/azadfcbftg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/azadfcbftg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/azadfcbftg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/aqzcpwwrcp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/aqzcpwwrcp"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/aqzcpwwrcp"] Step #5: Rust stderr: Step #5: /tmp/aqzcpwwrcp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/aqzcpwwrcp: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/aqzcpwwrcp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/kovwhqmymz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/kovwhqmymz"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/kovwhqmymz"] Step #5: Rust stderr: Step #5: /tmp/kovwhqmymz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kovwhqmymz: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/kovwhqmymz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/tjnxupmfyh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/tjnxupmfyh"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/tjnxupmfyh"] Step #5: Rust stderr: Step #5: /tmp/tjnxupmfyh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tjnxupmfyh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/tjnxupmfyh"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "sha1", "/tmp/xymukmnycr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "sha1", "/tmp/xymukmnycr"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "sha1", "/tmp/xymukmnycr"] Step #5: Rust stderr: Step #5: /tmp/xymukmnycr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xymukmnycr: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "sha1", "/tmp/xymukmnycr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/bfumhoavaq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/bfumhoavaq"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/bfumhoavaq"] Step #5: Rust stderr: Step #5: /tmp/bfumhoavaq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bfumhoavaq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/bfumhoavaq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/jythpuvnse", "-a", "crc", "/tmp/jfbzxywuio"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/jythpuvnse", "-a", "crc", "/tmp/jfbzxywuio"] Step #5: === Compare result for: cksum ["-c", "/tmp/jythpuvnse", "-a", "crc", "/tmp/jfbzxywuio"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/jythpuvnse", "-a", "crc", "/tmp/jfbzxywuio"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/mdzgilvgrx", "-a", "sha1", "/tmp/gafuutween"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/mdzgilvgrx", "-a", "sha1", "/tmp/gafuutween"] Step #5: === Compare result for: cksum ["-c", "/tmp/mdzgilvgrx", "-a", "sha1", "/tmp/gafuutween"] Step #5: Rust stderr: Step #5: /tmp/mdzgilvgrx: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/gafuutween: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mdzgilvgrx: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/gafuutween: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/mdzgilvgrx", "-a", "sha1", "/tmp/gafuutween"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/mdlvhdldjl", "-a", "crc", "/tmp/xujigokwlt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/mdlvhdldjl", "-a", "crc", "/tmp/xujigokwlt"] Step #5: === Compare result for: cksum ["-c", "/tmp/mdlvhdldjl", "-a", "crc", "/tmp/xujigokwlt"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/mdlvhdldjl", "-a", "crc", "/tmp/xujigokwlt"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "152", "-c", "-a", "md5", "/tmp/lgsostzmuw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "152", "-c", "-a", "md5", "/tmp/lgsostzmuw"] Step #5: === Compare result for: cksum ["-l", "152", "-c", "-a", "md5", "/tmp/lgsostzmuw"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "152", "-c", "-a", "md5", "/tmp/lgsostzmuw"] Step #5: Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/tpiozawhkl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/tpiozawhkl"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/tpiozawhkl"] Step #5: Rust stderr: Step #5: /tmp/tpiozawhkl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tpiozawhkl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/tpiozawhkl"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "crc", "/tmp/tbtbhzdgdq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "crc", "/tmp/tbtbhzdgdq"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "crc", "/tmp/tbtbhzdgdq"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "crc", "/tmp/tbtbhzdgdq"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "/tmp/himhslqdvu", "-a", "blake2b", "/tmp/yilgtazblt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "/tmp/himhslqdvu", "-a", "blake2b", "/tmp/yilgtazblt"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "/tmp/himhslqdvu", "-a", "blake2b", "/tmp/yilgtazblt"] Step #5: Rust stderr: Step #5: /tmp/himhslqdvu: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/yilgtazblt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/himhslqdvu: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/yilgtazblt: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "/tmp/himhslqdvu", "-a", "blake2b", "/tmp/yilgtazblt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/tfetowrikv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/tfetowrikv"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/tfetowrikv"] Step #5: Rust stderr: Step #5: /tmp/tfetowrikv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tfetowrikv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/tfetowrikv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "--raw", "-c", "-a", "sm3", "/tmp/axxhqjkdbw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "--raw", "-c", "-a", "sm3", "/tmp/axxhqjkdbw"] Step #5: === Compare result for: cksum ["-a", "sha1", "--raw", "-c", "-a", "sm3", "/tmp/axxhqjkdbw"] Step #5: Rust stderr: Step #5: /tmp/axxhqjkdbw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/axxhqjkdbw: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "--raw", "-c", "-a", "sm3", "/tmp/axxhqjkdbw"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "403", "-a", "blake2b", "/tmp/dczeqjoftb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "403", "-a", "blake2b", "/tmp/dczeqjoftb"] Step #5: === Compare result for: cksum ["-l", "403", "-a", "blake2b", "/tmp/dczeqjoftb"] Step #5: Rust stderr: Step #5: invalid length: '403' Step #5: fuzz_cksum: length is not a multiple of 8 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -invalid length: '403' Step #5: -fuzz_cksum: length is not a multiple of 8 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "403", "-a", "blake2b", "/tmp/dczeqjoftb"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "242", "-c", "-a", "md5", "/tmp/plilwoybem"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "242", "-c", "-a", "md5", "/tmp/plilwoybem"] Step #5: === Compare result for: cksum ["-l", "242", "-c", "-a", "md5", "/tmp/plilwoybem"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "242", "-c", "-a", "md5", "/tmp/plilwoybem"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "--tag", "-c", "-a", "sha384", "/tmp/bhjhivjdkk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "--tag", "-c", "-a", "sha384", "/tmp/bhjhivjdkk"] Step #5: === Compare result for: cksum ["-a", "sha224", "--tag", "-c", "-a", "sha384", "/tmp/bhjhivjdkk"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "--tag", "-c", "-a", "sha384", "/tmp/bhjhivjdkk"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "sha384", "/tmp/jpmhymvmss"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "sha384", "/tmp/jpmhymvmss"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "sha384", "/tmp/jpmhymvmss"] Step #5: Rust stderr: Step #5: /tmp/jpmhymvmss: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jpmhymvmss: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "sha384", "/tmp/jpmhymvmss"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/ztevlbpqvp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/ztevlbpqvp"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/ztevlbpqvp"] Step #5: Rust stderr: Step #5: /tmp/ztevlbpqvp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ztevlbpqvp: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/ztevlbpqvp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/cavitwiosv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/cavitwiosv"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/cavitwiosv"] Step #5: Rust stderr: Step #5: /tmp/cavitwiosv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cavitwiosv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/cavitwiosv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/xsdyhxewer"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/xsdyhxewer"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/xsdyhxewer"] Step #5: Rust stderr: Step #5: /tmp/xsdyhxewer: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xsdyhxewer: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/xsdyhxewer"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "sha224", "/tmp/wojfqhhysw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "sha224", "/tmp/wojfqhhysw"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "sha224", "/tmp/wojfqhhysw"] Step #5: Rust stderr: Step #5: /tmp/wojfqhhysw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wojfqhhysw: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "sha224", "/tmp/wojfqhhysw"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "/tmp/pfeavknyur", "-a", "sha256", "/tmp/rdmpxyxqnm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "/tmp/pfeavknyur", "-a", "sha256", "/tmp/rdmpxyxqnm"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "/tmp/pfeavknyur", "-a", "sha256", "/tmp/rdmpxyxqnm"] Step #5: Rust stderr: Step #5: /tmp/pfeavknyur: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/rdmpxyxqnm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pfeavknyur: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/rdmpxyxqnm: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "/tmp/pfeavknyur", "-a", "sha256", "/tmp/rdmpxyxqnm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/zwgodqobwk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/zwgodqobwk"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/zwgodqobwk"] Step #5: Rust stderr: Step #5: /tmp/zwgodqobwk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zwgodqobwk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/zwgodqobwk"] Step #5: Step #5: === TEST cksum ["cksum", "file_Ã"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_Ã"] Step #5: === Compare result for: cksum ["file_Ã"] Step #5: Rust stderr: Step #5: file_Ã: No such file or directory Step #5: GNU stderr: Step #5: 'file_'$'\303\203': No such file or directory Step #5: --- START diff Step #5: -file_Ã: No such file or directory Step #5: +'file_'$'\303\203': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["file_Ã"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/jtfkcymehx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/jtfkcymehx"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/jtfkcymehx"] Step #5: Rust stderr: Step #5: /tmp/jtfkcymehx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jtfkcymehx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/jtfkcymehx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "/tmp/kmcgbmotba"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "/tmp/kmcgbmotba"] Step #5: === Compare result for: cksum ["-a", "sm3", "/tmp/kmcgbmotba"] Step #5: Rust stdout: Step #5: SM3 (/tmp/kmcgbmotba) = c20b0c56c1ec53f16b7abd2749f6768d10557f55772a9aa632bdaf7cbfb73b34 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SM3 (/tmp/kmcgbmotba) = c20b0c56c1ec53f16b7abd2749f6768d10557f55772a9aa632bdaf7cbfb73b34 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sm3", "/tmp/kmcgbmotba"] Step #5: Step #5: thread '' (503) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sm3", "/tmp/kmcgbmotba"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==503== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3b, Step #5: ; Step #5: artifact_prefix='./'; Test unit written to ./crash-2d14ab97cc3dc294c51c0d6814f4ea45f4b4e312 Step #5: Base64: Ow== Step #5: MERGE-OUTER: attempt 2 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765207806 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/2d14ab97cc3dc294c51c0d6814f4ea45f4b4e312' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 82 processed earlier; will process 342 files now Step #5: === TEST cksum ["cksum", "-l", "328", "-c", "-a", "sha384", "/tmp/rrqifjwnrs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "328", "-c", "-a", "sha384", "/tmp/rrqifjwnrs"] Step #5: === Compare result for: cksum ["-l", "328", "-c", "-a", "sha384", "/tmp/rrqifjwnrs"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "328", "-c", "-a", "sha384", "/tmp/rrqifjwnrs"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/lafbhtpssp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/lafbhtpssp"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/lafbhtpssp"] Step #5: Rust stderr: Step #5: /tmp/lafbhtpssp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lafbhtpssp: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/lafbhtpssp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/cfwmlcgazz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/cfwmlcgazz"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/cfwmlcgazz"] Step #5: Rust stderr: Step #5: /tmp/cfwmlcgazz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cfwmlcgazz: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/cfwmlcgazz"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-l", "304", "-c", "-a", "bsd", "/tmp/qskytakioh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-l", "304", "-c", "-a", "bsd", "/tmp/qskytakioh"] Step #5: === Compare result for: cksum ["--binary", "-l", "304", "-c", "-a", "bsd", "/tmp/qskytakioh"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-l", "304", "-c", "-a", "bsd", "/tmp/qskytakioh"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/ztthzxyrri"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/ztthzxyrri"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/ztthzxyrri"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/ztthzxyrri"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-l", "440", "-c", "-a", "sysv", "/tmp/rqlhplaqpv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-l", "440", "-c", "-a", "sysv", "/tmp/rqlhplaqpv"] Step #5: === Compare result for: cksum ["-a", "sha1", "-l", "440", "-c", "-a", "sysv", "/tmp/rqlhplaqpv"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-l", "440", "-c", "-a", "sysv", "/tmp/rqlhplaqpv"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "sha1", "/tmp/uqtdruohep"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "sha1", "/tmp/uqtdruohep"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "sha1", "/tmp/uqtdruohep"] Step #5: Rust stderr: Step #5: /tmp/uqtdruohep: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uqtdruohep: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "sha1", "/tmp/uqtdruohep"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/rconncybkt", "-a", "bsd", "/tmp/lhwsmffbed"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/rconncybkt", "-a", "bsd", "/tmp/lhwsmffbed"] Step #5: === Compare result for: cksum ["-c", "/tmp/rconncybkt", "-a", "bsd", "/tmp/lhwsmffbed"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/rconncybkt", "-a", "bsd", "/tmp/lhwsmffbed"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/uidnlmfiej"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/uidnlmfiej"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/uidnlmfiej"] Step #5: Rust stderr: Step #5: /tmp/uidnlmfiej: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uidnlmfiej: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/uidnlmfiej"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha256", "/tmp/ztphkfpukg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha256", "/tmp/ztphkfpukg"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha256", "/tmp/ztphkfpukg"] Step #5: Rust stderr: Step #5: /tmp/ztphkfpukg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ztphkfpukg: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha256", "/tmp/ztphkfpukg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/vbjgfqqfji", "-a", "sha256", "/tmp/zdxmcmejxm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/vbjgfqqfji", "-a", "sha256", "/tmp/zdxmcmejxm"] Step #5: === Compare result for: cksum ["-c", "/tmp/vbjgfqqfji", "-a", "sha256", "/tmp/zdxmcmejxm"] Step #5: Rust stderr: Step #5: /tmp/vbjgfqqfji: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/zdxmcmejxm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vbjgfqqfji: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/zdxmcmejxm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/vbjgfqqfji", "-a", "sha256", "/tmp/zdxmcmejxm"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "66", "-c", "-a", "md5", "/tmp/smlozeqaxc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "66", "-c", "-a", "md5", "/tmp/smlozeqaxc"] Step #5: === Compare result for: cksum ["-l", "66", "-c", "-a", "md5", "/tmp/smlozeqaxc"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "66", "-c", "-a", "md5", "/tmp/smlozeqaxc"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/yjosrxmndp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/yjosrxmndp"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/yjosrxmndp"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/yjosrxmndp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/dmutfvzqpy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/dmutfvzqpy"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/dmutfvzqpy"] Step #5: Rust stderr: Step #5: /tmp/dmutfvzqpy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dmutfvzqpy: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/dmutfvzqpy"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-l", "425", "-c", "-a", "sha384", "/tmp/nzftkewflw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-l", "425", "-c", "-a", "sha384", "/tmp/nzftkewflw"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-l", "425", "-c", "-a", "sha384", "/tmp/nzftkewflw"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-l", "425", "-c", "-a", "sha384", "/tmp/nzftkewflw"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sha384", "/tmp/kvzijvzour"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sha384", "/tmp/kvzijvzour"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sha384", "/tmp/kvzijvzour"] Step #5: Rust stderr: Step #5: /tmp/kvzijvzour: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kvzijvzour: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sha384", "/tmp/kvzijvzour"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/dolhvejlgq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/dolhvejlgq"] Step #5: MERGE-OUTER: attempt 3 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765272568 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/a8abd012eb59b862bf9bc1ea443d2f35a1a2e222' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 99 processed earlier; will process 325 files now Step #5: === TEST cksum ["cksum", "-c", "/tmp/dcdmayanrw", "-a", "sha512", "/tmp/mknamdzdct"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/dcdmayanrw", "-a", "sha512", "/tmp/mknamdzdct"] Step #5: === Compare result for: cksum ["-c", "/tmp/dcdmayanrw", "-a", "sha512", "/tmp/mknamdzdct"] Step #5: Rust stderr: Step #5: /tmp/dcdmayanrw: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/mknamdzdct: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dcdmayanrw: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/mknamdzdct: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/dcdmayanrw", "-a", "sha512", "/tmp/mknamdzdct"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha256", "--text", "-c", "-a", "sha256", "/tmp/jwqfowbmlt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "--text", "-c", "-a", "sha256", "/tmp/jwqfowbmlt"] Step #5: === Compare result for: cksum ["-a", "sha256", "--text", "-c", "-a", "sha256", "/tmp/jwqfowbmlt"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "--text", "-c", "-a", "sha256", "/tmp/jwqfowbmlt"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha1", "/tmp/wrmbipwyek"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha1", "/tmp/wrmbipwyek"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha1", "/tmp/wrmbipwyek"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha1", "/tmp/wrmbipwyek"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/rkoyoyvpzm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/rkoyoyvpzm"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/rkoyoyvpzm"] Step #5: Rust stderr: Step #5: /tmp/rkoyoyvpzm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rkoyoyvpzm: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/rkoyoyvpzm"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha1", "/tmp/owqydxjoza"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha1", "/tmp/owqydxjoza"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha1", "/tmp/owqydxjoza"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha1", "/tmp/owqydxjoza"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "/tmp/dsgibkrdfr", "-a", "bsd", "/tmp/ztakpvywfh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "/tmp/dsgibkrdfr", "-a", "bsd", "/tmp/ztakpvywfh"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "/tmp/dsgibkrdfr", "-a", "bsd", "/tmp/ztakpvywfh"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "/tmp/dsgibkrdfr", "-a", "bsd", "/tmp/ztakpvywfh"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "bsd", "/tmp/xvcmdvvubv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "bsd", "/tmp/xvcmdvvubv"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "bsd", "/tmp/xvcmdvvubv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "bsd", "/tmp/xvcmdvvubv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yygeuojswr", "-a", "md5", "/tmp/aszwxmdvyg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yygeuojswr", "-a", "md5", "/tmp/aszwxmdvyg"] Step #5: === Compare result for: cksum ["-c", "/tmp/yygeuojswr", "-a", "md5", "/tmp/aszwxmdvyg"] Step #5: Rust stderr: Step #5: /tmp/yygeuojswr: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/aszwxmdvyg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yygeuojswr: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/aszwxmdvyg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yygeuojswr", "-a", "md5", "/tmp/aszwxmdvyg"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sysv", "-l", "152", "-c", "-a", "sha224", "/tmp/bclrmcbtsp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-l", "152", "-c", "-a", "sha224", "/tmp/bclrmcbtsp"] Step #5: === Compare result for: cksum ["-a", "sysv", "-l", "152", "-c", "-a", "sha224", "/tmp/bclrmcbtsp"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-l", "152", "-c", "-a", "sha224", "/tmp/bclrmcbtsp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/kbjrdqxics"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/kbjrdqxics"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/kbjrdqxics"] Step #5: Rust stderr: Step #5: /tmp/kbjrdqxics: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kbjrdqxics: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/kbjrdqxics"] Step #5: Step #5: === TEST cksum ["cksum", "file_8u", "/tmp/okhyebczxc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_8u", "/tmp/okhyebczxc"] Step #5: === Compare result for: cksum ["file_8u", "/tmp/okhyebczxc"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/nqdkasdncv", "-a", "sha256", "/tmp/jthrzcyfjq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/nqdkasdncv", "-a", "sha256", "/tmp/jthrzcyfjq"] Step #5: === Compare result for: cksum ["-c", "/tmp/nqdkasdncv", "-a", "sha256", "/tmp/jthrzcyfjq"] Step #5: Rust stderr: Step #5: /tmp/nqdkasdncv: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/jthrzcyfjq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/nqdkasdncv: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/jthrzcyfjq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/nqdkasdncv", "-a", "sha256", "/tmp/jthrzcyfjq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/ecwlxpjxke"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/ecwlxpjxke"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/ecwlxpjxke"] Step #5: Rust stderr: Step #5: /tmp/ecwlxpjxke: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ecwlxpjxke: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/ecwlxpjxke"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "/tmp/dbecbicodu", "-a", "sha512", "/tmp/oyrgsfgtqc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "/tmp/dbecbicodu", "-a", "sha512", "/tmp/oyrgsfgtqc"] Step #5: === Compare result for: cksum ["-a", "sha224", "/tmp/dbecbicodu", "-a", "sha512", "/tmp/oyrgsfgtqc"] Step #5: Rust stdout: Step #5: SHA512 (/tmp/dbecbicodu) = acf2ea2872db1c035ee510a6e0a8bb9f73d8a185bffc3fefecd299891c941a946239c773a65274c3b170c588e925b5dcd2d42bc5c9cb48c69e51737df663bf35 Step #5: SHA512 (/tmp/oyrgsfgtqc) = b26c56657d90d02a72f8bb6800fd9daaea4851d41f2c7c39c415603c920cefaa96045880f889e07eba87ad7aeb748e583715b7bca488a8c9e3c9d62dff1ea1fa Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA512 (/tmp/dbecbicodu) = acf2ea2872db1c035ee510a6e0a8bb9f73d8a185bffc3fefecd299891c941a946239c773a65274c3b170c588e925b5dcd2d42bc5c9cb48c69e51737df663bf35 Step #5: -SHA512 (/tmp/oyrgsfgtqc) = b26c56657d90d02a72f8bb6800fd9daaea4851d41f2c7c39c415603c920cefaa96045880f889e07eba87ad7aeb748e583715b7bca488a8c9e3c9d62dff1ea1fa Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sha224", "/tmp/dbecbicodu", "-a", "sha512", "/tmp/oyrgsfgtqc"] Step #5: Step #5: thread '' (3099) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sha224", "/tmp/dbecbicodu", "-a", "sha512", "/tmp/oyrgsfgtqc"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3099== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5c,0x5c, Step #5: \\\\ Step #5: artifact_prefix='./'; Test unit written to ./crash-9e94758983980504af303ef297fd2bf9d9cea063 Step #5: Base64: XFw= Step #5: MERGE-OUTER: attempt 4 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765329980 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/9e94758983980504af303ef297fd2bf9d9cea063' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 113 processed earlier; will process 311 files now Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha256", "/tmp/weskblewiq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha256", "/tmp/weskblewiq"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha256", "/tmp/weskblewiq"] Step #5: Rust stderr: Step #5: /tmp/weskblewiq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/weskblewiq: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha256", "/tmp/weskblewiq"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha256", "--untagged", "-c", "/tmp/xmtbqhwgvj", "-a", "blake2b", "/tmp/kzftnvidlr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "--untagged", "-c", "/tmp/xmtbqhwgvj", "-a", "blake2b", "/tmp/kzftnvidlr"] Step #5: === Compare result for: cksum ["-a", "sha256", "--untagged", "-c", "/tmp/xmtbqhwgvj", "-a", "blake2b", "/tmp/kzftnvidlr"] Step #5: Rust stderr: Step #5: /tmp/xmtbqhwgvj: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/kzftnvidlr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xmtbqhwgvj: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/kzftnvidlr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "--untagged", "-c", "/tmp/xmtbqhwgvj", "-a", "blake2b", "/tmp/kzftnvidlr"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "bsd", "/tmp/rohfyurnwn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "bsd", "/tmp/rohfyurnwn"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "bsd", "/tmp/rohfyurnwn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "bsd", "/tmp/rohfyurnwn"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "sha512", "/tmp/uftktthgld"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "sha512", "/tmp/uftktthgld"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "sha512", "/tmp/uftktthgld"] Step #5: Rust stderr: Step #5: /tmp/uftktthgld: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uftktthgld: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "sha512", "/tmp/uftktthgld"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/jjhnymdybx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/jjhnymdybx"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/jjhnymdybx"] Step #5: Rust stderr: Step #5: /tmp/jjhnymdybx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jjhnymdybx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/jjhnymdybx"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "194", "-c", "-a", "sha512", "/tmp/kasaoskyil"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "194", "-c", "-a", "sha512", "/tmp/kasaoskyil"] Step #5: === Compare result for: cksum ["-l", "194", "-c", "-a", "sha512", "/tmp/kasaoskyil"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "194", "-c", "-a", "sha512", "/tmp/kasaoskyil"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/xyjowikzre"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/xyjowikzre"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/xyjowikzre"] Step #5: Rust stderr: Step #5: /tmp/xyjowikzre: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xyjowikzre: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/xyjowikzre"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "md5", "/tmp/jltuapglfa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "md5", "/tmp/jltuapglfa"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "md5", "/tmp/jltuapglfa"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "md5", "/tmp/jltuapglfa"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/zfiibeswqn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/zfiibeswqn"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/zfiibeswqn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/zfiibeswqn"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "file_⚙VfZ", "file_(WQS", "/tmp/hqanhrvuyp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "file_⚙VfZ", "file_(WQS", "/tmp/hqanhrvuyp"] Step #5: === Compare result for: cksum ["-a", "bsd", "file_⚙VfZ", "file_(WQS", "/tmp/hqanhrvuyp"] Step #5: Rust stdout: Step #5: 38468 1 /tmp/hqanhrvuyp Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -38468 1 /tmp/hqanhrvuyp Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: file_⚙VfZ: No such file or directory Step #5: fuzz_cksum: file_(WQS: No such file or directory Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_⚙VfZ: No such file or directory Step #5: -fuzz_cksum: file_(WQS: No such file or directory Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: cksum ["-a", "bsd", "file_⚙VfZ", "file_(WQS", "/tmp/hqanhrvuyp"] Step #5: Step #5: thread '' (3521) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "bsd", "file_⚙VfZ", "file_(WQS", "/tmp/hqanhrvuyp"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3521== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x9d,0x21, Step #5: \235! Step #5: artifact_prefix='./'; Test unit written to ./crash-2eeb02cc206356662eabd8bf1f09f10d28b44e4a Step #5: Base64: nSE= Step #5: MERGE-OUTER: attempt 5 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765373934 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/2eeb02cc206356662eabd8bf1f09f10d28b44e4a' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 123 processed earlier; will process 301 files now Step #5: === TEST cksum ["cksum", "-a", "sha256", "--untagged", "-c", "-a", "sha224", "/tmp/ooslnjmadu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "--untagged", "-c", "-a", "sha224", "/tmp/ooslnjmadu"] Step #5: === Compare result for: cksum ["-a", "sha256", "--untagged", "-c", "-a", "sha224", "/tmp/ooslnjmadu"] Step #5: Rust stderr: Step #5: /tmp/ooslnjmadu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ooslnjmadu: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "--untagged", "-c", "-a", "sha224", "/tmp/ooslnjmadu"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha512", "/tmp/npkibqvsqr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha512", "/tmp/npkibqvsqr"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha512", "/tmp/npkibqvsqr"] Step #5: Rust stderr: Step #5: /tmp/npkibqvsqr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/npkibqvsqr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha512", "/tmp/npkibqvsqr"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/wrocvkfgcd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/wrocvkfgcd"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/wrocvkfgcd"] Step #5: Rust stderr: Step #5: /tmp/wrocvkfgcd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wrocvkfgcd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/wrocvkfgcd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/pwnmrwbwwt", "-a", "sha224", "/tmp/onmmyqwflq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/pwnmrwbwwt", "-a", "sha224", "/tmp/onmmyqwflq"] Step #5: === Compare result for: cksum ["-c", "/tmp/pwnmrwbwwt", "-a", "sha224", "/tmp/onmmyqwflq"] Step #5: Rust stderr: Step #5: /tmp/pwnmrwbwwt: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/onmmyqwflq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pwnmrwbwwt: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/onmmyqwflq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/pwnmrwbwwt", "-a", "sha224", "/tmp/onmmyqwflq"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/bjzphpxqve"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/bjzphpxqve"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/bjzphpxqve"] Step #5: Rust stderr: Step #5: /tmp/bjzphpxqve: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bjzphpxqve: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/bjzphpxqve"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/lngfiurqhd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/lngfiurqhd"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/lngfiurqhd"] Step #5: Rust stderr: Step #5: /tmp/lngfiurqhd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lngfiurqhd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/lngfiurqhd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/cyvbwqpqzn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/cyvbwqpqzn"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/cyvbwqpqzn"] Step #5: Rust stderr: Step #5: /tmp/cyvbwqpqzn: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cyvbwqpqzn: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/cyvbwqpqzn"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "--base64", "-c", "/tmp/jxjcxzprap", "-a", "md5", "/tmp/hhpybwewkd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "--base64", "-c", "/tmp/jxjcxzprap", "-a", "md5", "/tmp/hhpybwewkd"] Step #5: === Compare result for: cksum ["-a", "sha256", "--base64", "-c", "/tmp/jxjcxzprap", "-a", "md5", "/tmp/hhpybwewkd"] Step #5: Rust stderr: Step #5: /tmp/jxjcxzprap: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/hhpybwewkd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jxjcxzprap: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/hhpybwewkd: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "--base64", "-c", "/tmp/jxjcxzprap", "-a", "md5", "/tmp/hhpybwewkd"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/pbgcjzdrzm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/pbgcjzdrzm"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/pbgcjzdrzm"] Step #5: Rust stderr: Step #5: /tmp/pbgcjzdrzm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pbgcjzdrzm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/pbgcjzdrzm"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/kacpqxintp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/kacpqxintp"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/kacpqxintp"] Step #5: Rust stderr: Step #5: /tmp/kacpqxintp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kacpqxintp: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/kacpqxintp"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha384", "/tmp/lzzomowbgd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha384", "/tmp/lzzomowbgd"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha384", "/tmp/lzzomowbgd"] Step #5: Rust stderr: Step #5: /tmp/lzzomowbgd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lzzomowbgd: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha384", "/tmp/lzzomowbgd"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "sha256", "/tmp/taiklgogar"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "sha256", "/tmp/taiklgogar"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "sha256", "/tmp/taiklgogar"] Step #5: Rust stderr: Step #5: /tmp/taiklgogar: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/taiklgogar: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "sha256", "/tmp/taiklgogar"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "/tmp/ypcarcbwzh", "-a", "sha384", "/tmp/lwfpwfosfv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "/tmp/ypcarcbwzh", "-a", "sha384", "/tmp/lwfpwfosfv"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "/tmp/ypcarcbwzh", "-a", "sha384", "/tmp/lwfpwfosfv"] Step #5: Rust stderr: Step #5: /tmp/ypcarcbwzh: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/lwfpwfosfv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ypcarcbwzh: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/lwfpwfosfv: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "/tmp/ypcarcbwzh", "-a", "sha384", "/tmp/lwfpwfosfv"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "crc", "/tmp/jnwbejxfrl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "crc", "/tmp/jnwbejxfrl"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "crc", "/tmp/jnwbejxfrl"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "crc", "/tmp/jnwbejxfrl"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/dljgbyqcmg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/dljgbyqcmg"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/dljgbyqcmg"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/dljgbyqcmg"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha224", "/tmp/hpfmjdccoq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha224", "/tmp/hpfmjdccoq"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha224", "/tmp/hpfmjdccoq"] Step #5: Rust stderr: Step #5: /tmp/hpfmjdccoq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hpfmjdccoq: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha224", "/tmp/hpfmjdccoq"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "-a", "sha1", "/tmp/romawgpnkn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "-a", "sha1", "/tmp/romawgpnkn"] Step #5: MERGE-OUTER: attempt 6 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765439988 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/053a8ba45f3ee31e39ce3c48f9fc889de49f63a1' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 140 processed earlier; will process 284 files now Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/wwzbigzwlx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "sha1", "/tmp/wwzbigzwlx"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/wwzbigzwlx"] Step #5: Rust stderr: Step #5: /tmp/wwzbigzwlx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wwzbigzwlx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "sha1", "/tmp/wwzbigzwlx"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/lzuobtcnut"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/lzuobtcnut"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/lzuobtcnut"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/lzuobtcnut"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha224", "--base64", "-c", "/tmp/kpxhkxmrkv", "-a", "sha1", "/tmp/zloqaznxeb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "--base64", "-c", "/tmp/kpxhkxmrkv", "-a", "sha1", "/tmp/zloqaznxeb"] Step #5: === Compare result for: cksum ["-a", "sha224", "--base64", "-c", "/tmp/kpxhkxmrkv", "-a", "sha1", "/tmp/zloqaznxeb"] Step #5: Rust stderr: Step #5: /tmp/kpxhkxmrkv: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/zloqaznxeb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kpxhkxmrkv: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/zloqaznxeb: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "--base64", "-c", "/tmp/kpxhkxmrkv", "-a", "sha1", "/tmp/zloqaznxeb"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "388", "-c", "-a", "sysv", "/tmp/vjmrehxodl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "388", "-c", "-a", "sysv", "/tmp/vjmrehxodl"] Step #5: === Compare result for: cksum ["-l", "388", "-c", "-a", "sysv", "/tmp/vjmrehxodl"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "388", "-c", "-a", "sysv", "/tmp/vjmrehxodl"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha384", "/tmp/vubaphmmdr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "/tmp/vubaphmmdr"] Step #5: === Compare result for: cksum ["-a", "sha384", "/tmp/vubaphmmdr"] Step #5: Rust stdout: Step #5: SHA384 (/tmp/vubaphmmdr) = 02fd68637690e4d33d261b0deb1886eb06fdb67d3e0804b18702429a67b9bb7b43dba3cde7563c257152e3d73c4be0be Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA384 (/tmp/vubaphmmdr) = 02fd68637690e4d33d261b0deb1886eb06fdb67d3e0804b18702429a67b9bb7b43dba3cde7563c257152e3d73c4be0be Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sha384", "/tmp/vubaphmmdr"] Step #5: Step #5: thread '' (4273) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sha384", "/tmp/vubaphmmdr"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4273== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x8d,0xdf, Step #5: \215\337 Step #5: artifact_prefix='./'; Test unit written to ./crash-d385700d1c74027dcd5bc6084c4475391ea04185 Step #5: Base64: jd8= Step #5: MERGE-OUTER: attempt 7 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765467899 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/d385700d1c74027dcd5bc6084c4475391ea04185' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 145 processed earlier; will process 279 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/ydhokczdhu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/ydhokczdhu"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/ydhokczdhu"] Step #5: Rust stderr: Step #5: /tmp/ydhokczdhu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ydhokczdhu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/ydhokczdhu"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/twdiwozibr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/twdiwozibr"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/twdiwozibr"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/twdiwozibr"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/nblvbebflh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/nblvbebflh"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/nblvbebflh"] Step #5: Rust stderr: Step #5: /tmp/nblvbebflh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/nblvbebflh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/nblvbebflh"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "-a", "sha224", "/tmp/pybqcevfls"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "-a", "sha224", "/tmp/pybqcevfls"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "-a", "sha224", "/tmp/pybqcevfls"] Step #5: Rust stderr: Step #5: /tmp/pybqcevfls: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pybqcevfls: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "-a", "sha224", "/tmp/pybqcevfls"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--binary", "-l", "484", "-c", "/tmp/rhvhzplyfp", "-a", "sysv", "/tmp/cmfdfexqfh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-l", "484", "-c", "/tmp/rhvhzplyfp", "-a", "sysv", "/tmp/cmfdfexqfh"] Step #5: === Compare result for: cksum ["--binary", "-l", "484", "-c", "/tmp/rhvhzplyfp", "-a", "sysv", "/tmp/cmfdfexqfh"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-l", "484", "-c", "/tmp/rhvhzplyfp", "-a", "sysv", "/tmp/cmfdfexqfh"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-l", "92", "-c", "-a", "sha384", "/tmp/dyctmlnhje"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-l", "92", "-c", "-a", "sha384", "/tmp/dyctmlnhje"] Step #5: === Compare result for: cksum ["-a", "sha224", "-l", "92", "-c", "-a", "sha384", "/tmp/dyctmlnhje"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-l", "92", "-c", "-a", "sha384", "/tmp/dyctmlnhje"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "blake2b", "/tmp/doaqzjqieu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "blake2b", "/tmp/doaqzjqieu"] Step #5: === Compare result for: cksum ["-c", "-a", "blake2b", "/tmp/doaqzjqieu"] Step #5: Rust stderr: Step #5: /tmp/doaqzjqieu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/doaqzjqieu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "blake2b", "/tmp/doaqzjqieu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/xxxzqftkee"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/xxxzqftkee"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/xxxzqftkee"] Step #5: Rust stderr: Step #5: /tmp/xxxzqftkee: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xxxzqftkee: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/xxxzqftkee"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--tag", "-c", "/tmp/kxovipxvdn", "-a", "sha256", "/tmp/doagdxihfu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "/tmp/kxovipxvdn", "-a", "sha256", "/tmp/doagdxihfu"] Step #5: === Compare result for: cksum ["--tag", "-c", "/tmp/kxovipxvdn", "-a", "sha256", "/tmp/doagdxihfu"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "/tmp/kxovipxvdn", "-a", "sha256", "/tmp/doagdxihfu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/hustoxaohb", "-a", "sha1", "/tmp/nkyfhjszac"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/hustoxaohb", "-a", "sha1", "/tmp/nkyfhjszac"] Step #5: === Compare result for: cksum ["-c", "/tmp/hustoxaohb", "-a", "sha1", "/tmp/nkyfhjszac"] Step #5: Rust stderr: Step #5: /tmp/hustoxaohb: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/nkyfhjszac: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hustoxaohb: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/nkyfhjszac: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/hustoxaohb", "-a", "sha1", "/tmp/nkyfhjszac"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "crc", "/tmp/oqfdircjmh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "crc", "/tmp/oqfdircjmh"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "crc", "/tmp/oqfdircjmh"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "crc", "/tmp/oqfdircjmh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/bwwekknswy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/bwwekknswy"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/bwwekknswy"] Step #5: Rust stderr: Step #5: /tmp/bwwekknswy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bwwekknswy: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/bwwekknswy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/yeibheuvsb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/yeibheuvsb"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/yeibheuvsb"] Step #5: Rust stderr: Step #5: /tmp/yeibheuvsb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yeibheuvsb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/yeibheuvsb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/ovisphrjez"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/ovisphrjez"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/ovisphrjez"] Step #5: Rust stderr: Step #5: /tmp/ovisphrjez: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ovisphrjez: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/ovisphrjez"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "sha512", "/tmp/evherxpxks"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "sha512", "/tmp/evherxpxks"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "sha512", "/tmp/evherxpxks"] Step #5: Rust stderr: Step #5: /tmp/evherxpxks: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/evherxpxks: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "sha512", "/tmp/evherxpxks"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/lyyokwhudm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/lyyokwhudm"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/lyyokwhudm"] Step #5: Rust stderr: Step #5: /tmp/lyyokwhudm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lyyokwhudm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/lyyokwhudm"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/shfymddixk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/shfymddixk"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/shfymddixk"] Step #5: Rust stderr: Step #5: /tmp/shfymddixk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/shfymddixk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/shfymddixk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/jwfkfscsfx", "-a", "bsd", "/tmp/tvcvtgkqxk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/jwfkfscsfx", "-a", "bsd", "/tmp/tvcvtgkqxk"] Step #5: === Compare result for: cksum ["-c", "/tmp/jwfkfscsfx", "-a", "bsd", "/tmp/tvcvtgkqxk"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/jwfkfscsfx", "-a", "bsd", "/tmp/tvcvtgkqxk"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/ybuoghgiug", "-a", "sha224", "/tmp/vequiannqn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/ybuoghgiug", "-a", "sha224", "/tmp/vequiannqn"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/ybuoghgiug", "-a", "sha224", "/tmp/vequiannqn"] Step #5: Rust stderr: Step #5: /tmp/ybuoghgiug: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/vequiannqn: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ybuoghgiug: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/vequiannqn: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/ybuoghgiug", "-a", "sha224", "/tmp/vequiannqn"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/mnwwfymics"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/mnwwfymics"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/mnwwfymics"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/mnwwfymics"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "bsd", "/tmp/eksqztywsr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "bsd", "/tmp/eksqztywsr"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "bsd", "/tmp/eksqztywsr"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "bsd", "/tmp/eksqztywsr"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "322", "-c", "/tmp/tijindnsfv", "-a", "sha1", "/tmp/rbrlhbyyym"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "322", "-c", "/tmp/tijindnsfv", "-a", "sha1", "/tmp/rbrlhbyyym"] Step #5: === Compare result for: cksum ["-l", "322", "-c", "/tmp/tijindnsfv", "-a", "sha1", "/tmp/rbrlhbyyym"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "322", "-c", "/tmp/tijindnsfv", "-a", "sha1", "/tmp/rbrlhbyyym"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "383", "-c", "/tmp/cmbpgniwur", "-a", "crc", "/tmp/rudcxgdesu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "383", "-c", "/tmp/cmbpgniwur", "-a", "crc", "/tmp/rudcxgdesu"] Step #5: === Compare result for: cksum ["-l", "383", "-c", "/tmp/cmbpgniwur", "-a", "crc", "/tmp/rudcxgdesu"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "383", "-c", "/tmp/cmbpgniwur", "-a", "crc", "/tmp/rudcxgdesu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/jtamdqorpb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/jtamdqorpb"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/jtamdqorpb"] Step #5: Rust stderr: Step #5: /tmp/jtamdqorpb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jtamdqorpb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/jtamdqorpb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/ruukyzzeiz", "-a", "md5", "/tmp/muoskwceru"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/ruukyzzeiz", "-a", "md5", "/tmp/muoskwceru"] Step #5: === Compare result for: cksum ["-c", "/tmp/ruukyzzeiz", "-a", "md5", "/tmp/muoskwceru"] Step #5: Rust stderr: Step #5: /tmp/ruukyzzeiz: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/muoskwceru: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ruukyzzeiz: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/muoskwceru: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/ruukyzzeiz", "-a", "md5", "/tmp/muoskwceru"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-l", "41", "-c", "-a", "sm3", "/tmp/crsuiflnsj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-l", "41", "-c", "-a", "sm3", "/tmp/crsuiflnsj"] Step #5: === Compare result for: cksum ["-a", "sha512", "-l", "41", "-c", "-a", "sm3", "/tmp/crsuiflnsj"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-l", "41", "-c", "-a", "sm3", "/tmp/crsuiflnsj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/bkfexdeugu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/bkfexdeugu"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/bkfexdeugu"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/bkfexdeugu"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "311", "-c", "-a", "crc", "/tmp/naljukwnwv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "311", "-c", "-a", "crc", "/tmp/naljukwnwv"] Step #5: === Compare result for: cksum ["-l", "311", "-c", "-a", "crc", "/tmp/naljukwnwv"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "311", "-c", "-a", "crc", "/tmp/naljukwnwv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "sha384", "/tmp/pwmsuhxtjr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "sha384", "/tmp/pwmsuhxtjr"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "sha384", "/tmp/pwmsuhxtjr"] Step #5: Rust stderr: Step #5: /tmp/pwmsuhxtjr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pwmsuhxtjr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "sha384", "/tmp/pwmsuhxtjr"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "/tmp/umsupqeltb", "-a", "sha384", "/tmp/yjnudaccva"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "/tmp/umsupqeltb", "-a", "sha384", "/tmp/yjnudaccva"] Step #5: MERGE-OUTER: attempt 8 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765582061 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/fb860221d243a7f8247d5e993092034d4eda231b' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 175 processed earlier; will process 249 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/mtksnodwrs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/mtksnodwrs"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/mtksnodwrs"] Step #5: Rust stderr: Step #5: /tmp/mtksnodwrs: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mtksnodwrs: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/mtksnodwrs"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--raw", "-l", "155", "-c", "-a", "sha512", "/tmp/jqfkdrfdje"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-l", "155", "-c", "-a", "sha512", "/tmp/jqfkdrfdje"] Step #5: === Compare result for: cksum ["--raw", "-l", "155", "-c", "-a", "sha512", "/tmp/jqfkdrfdje"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-l", "155", "-c", "-a", "sha512", "/tmp/jqfkdrfdje"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "479", "-c", "/tmp/vrotbvtjfx", "-a", "sha1", "/tmp/kkfkdjydbi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "479", "-c", "/tmp/vrotbvtjfx", "-a", "sha1", "/tmp/kkfkdjydbi"] Step #5: === Compare result for: cksum ["-l", "479", "-c", "/tmp/vrotbvtjfx", "-a", "sha1", "/tmp/kkfkdjydbi"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "479", "-c", "/tmp/vrotbvtjfx", "-a", "sha1", "/tmp/kkfkdjydbi"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "sha384", "/tmp/myyixndgpv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "sha384", "/tmp/myyixndgpv"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "sha384", "/tmp/myyixndgpv"] Step #5: Rust stderr: Step #5: /tmp/myyixndgpv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/myyixndgpv: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "sha384", "/tmp/myyixndgpv"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/fntdglklkq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/fntdglklkq"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/fntdglklkq"] Step #5: Rust stderr: Step #5: /tmp/fntdglklkq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fntdglklkq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/fntdglklkq"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-l", "333", "-c", "/tmp/rwrblvibqy", "-a", "sha224", "/tmp/kfuggoyexs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-l", "333", "-c", "/tmp/rwrblvibqy", "-a", "sha224", "/tmp/kfuggoyexs"] Step #5: === Compare result for: cksum ["-a", "sha1", "-l", "333", "-c", "/tmp/rwrblvibqy", "-a", "sha224", "/tmp/kfuggoyexs"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-l", "333", "-c", "/tmp/rwrblvibqy", "-a", "sha224", "/tmp/kfuggoyexs"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "--binary", "-l", "134", "-c", "/tmp/gsxvblpils", "-a", "blake2b", "/tmp/ubhevkuqtf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "--binary", "-l", "134", "-c", "/tmp/gsxvblpils", "-a", "blake2b", "/tmp/ubhevkuqtf"] Step #5: === Compare result for: cksum ["-a", "blake2b", "--binary", "-l", "134", "-c", "/tmp/gsxvblpils", "-a", "blake2b", "/tmp/ubhevkuqtf"] Step #5: Rust stderr: Step #5: invalid length: '134' Step #5: fuzz_cksum: length is not a multiple of 8 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -invalid length: '134' Step #5: -fuzz_cksum: length is not a multiple of 8 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "--binary", "-l", "134", "-c", "/tmp/gsxvblpils", "-a", "blake2b", "/tmp/ubhevkuqtf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "crc", "/tmp/fdcmqtigzc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "crc", "/tmp/fdcmqtigzc"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "crc", "/tmp/fdcmqtigzc"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "crc", "/tmp/fdcmqtigzc"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/jynocdovli"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/jynocdovli"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/jynocdovli"] Step #5: Rust stderr: Step #5: /tmp/jynocdovli: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jynocdovli: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/jynocdovli"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/exzebagogj", "-a", "sha256", "/tmp/uujznziddu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/exzebagogj", "-a", "sha256", "/tmp/uujznziddu"] Step #5: === Compare result for: cksum ["-c", "/tmp/exzebagogj", "-a", "sha256", "/tmp/uujznziddu"] Step #5: Rust stderr: Step #5: /tmp/exzebagogj: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/uujznziddu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/exzebagogj: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/uujznziddu: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/exzebagogj", "-a", "sha256", "/tmp/uujznziddu"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "52", "-c", "-a", "md5", "/tmp/qhyoqxraqw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "52", "-c", "-a", "md5", "/tmp/qhyoqxraqw"] Step #5: === Compare result for: cksum ["-l", "52", "-c", "-a", "md5", "/tmp/qhyoqxraqw"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "52", "-c", "-a", "md5", "/tmp/qhyoqxraqw"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "--binary", "-c", "-a", "sha512", "/tmp/bkkbpewtmx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "--binary", "-c", "-a", "sha512", "/tmp/bkkbpewtmx"] Step #5: === Compare result for: cksum ["-a", "sha1", "--binary", "-c", "-a", "sha512", "/tmp/bkkbpewtmx"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "--binary", "-c", "-a", "sha512", "/tmp/bkkbpewtmx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "crc", "/tmp/gsobwaqkun"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "crc", "/tmp/gsobwaqkun"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "crc", "/tmp/gsobwaqkun"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "crc", "/tmp/gsobwaqkun"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/xyrtvtgnfx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/xyrtvtgnfx"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/xyrtvtgnfx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/xyrtvtgnfx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "/tmp/opzftrmzpa", "-a", "sm3", "/tmp/hbknyeorfv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "/tmp/opzftrmzpa", "-a", "sm3", "/tmp/hbknyeorfv"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "/tmp/opzftrmzpa", "-a", "sm3", "/tmp/hbknyeorfv"] Step #5: Rust stderr: Step #5: /tmp/opzftrmzpa: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/hbknyeorfv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/opzftrmzpa: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/hbknyeorfv: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "/tmp/opzftrmzpa", "-a", "sm3", "/tmp/hbknyeorfv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/vsnwrgqpva"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/vsnwrgqpva"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/vsnwrgqpva"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/vsnwrgqpva"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "90", "-c", "-a", "blake2b", "/tmp/piwcejmduh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "90", "-c", "-a", "blake2b", "/tmp/piwcejmduh"] Step #5: === Compare result for: cksum ["-l", "90", "-c", "-a", "blake2b", "/tmp/piwcejmduh"] Step #5: Rust stderr: Step #5: invalid length: '90' Step #5: fuzz_cksum: length is not a multiple of 8 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -invalid length: '90' Step #5: -fuzz_cksum: length is not a multiple of 8 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "90", "-c", "-a", "blake2b", "/tmp/piwcejmduh"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "197", "-c", "/tmp/tbvubtyawf", "-a", "md5", "/tmp/irvisrgehl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "197", "-c", "/tmp/tbvubtyawf", "-a", "md5", "/tmp/irvisrgehl"] Step #5: === Compare result for: cksum ["-l", "197", "-c", "/tmp/tbvubtyawf", "-a", "md5", "/tmp/irvisrgehl"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "197", "-c", "/tmp/tbvubtyawf", "-a", "md5", "/tmp/irvisrgehl"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "436", "-c", "-a", "crc", "/tmp/jruxawoblf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "436", "-c", "-a", "crc", "/tmp/jruxawoblf"] Step #5: === Compare result for: cksum ["-l", "436", "-c", "-a", "crc", "/tmp/jruxawoblf"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "436", "-c", "-a", "crc", "/tmp/jruxawoblf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "sha224", "/tmp/eebddmixcb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "sha224", "/tmp/eebddmixcb"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "sha224", "/tmp/eebddmixcb"] Step #5: Rust stderr: Step #5: /tmp/eebddmixcb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eebddmixcb: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "sha224", "/tmp/eebddmixcb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/wbftyecskt", "-a", "blake2b", "/tmp/acfumlhpas"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/wbftyecskt", "-a", "blake2b", "/tmp/acfumlhpas"] Step #5: === Compare result for: cksum ["-c", "/tmp/wbftyecskt", "-a", "blake2b", "/tmp/acfumlhpas"] Step #5: Rust stderr: Step #5: /tmp/wbftyecskt: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/acfumlhpas: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wbftyecskt: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/acfumlhpas: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/wbftyecskt", "-a", "blake2b", "/tmp/acfumlhpas"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "/tmp/kvqwgwqmxl", "-a", "md5", "/tmp/xjoxknzrrr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "/tmp/kvqwgwqmxl", "-a", "md5", "/tmp/xjoxknzrrr"] Step #5: === Compare result for: cksum ["--tag", "-c", "/tmp/kvqwgwqmxl", "-a", "md5", "/tmp/xjoxknzrrr"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "/tmp/kvqwgwqmxl", "-a", "md5", "/tmp/xjoxknzrrr"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "/tmp/erraurptsy", "-a", "sha512", "/tmp/kjudwtidbz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "/tmp/erraurptsy", "-a", "sha512", "/tmp/kjudwtidbz"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "/tmp/erraurptsy", "-a", "sha512", "/tmp/kjudwtidbz"] Step #5: Rust stderr: Step #5: /tmp/erraurptsy: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/kjudwtidbz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/erraurptsy: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/kjudwtidbz: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "/tmp/erraurptsy", "-a", "sha512", "/tmp/kjudwtidbz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/ktndhrewbl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/ktndhrewbl"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/ktndhrewbl"] Step #5: Rust stderr: Step #5: /tmp/ktndhrewbl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ktndhrewbl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/ktndhrewbl"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/flqcjqderg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/flqcjqderg"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/flqcjqderg"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/flqcjqderg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/ivehhspgpr", "-a", "sha384", "/tmp/bqoxsvdqcn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/ivehhspgpr", "-a", "sha384", "/tmp/bqoxsvdqcn"] Step #5: === Compare result for: cksum ["-c", "/tmp/ivehhspgpr", "-a", "sha384", "/tmp/bqoxsvdqcn"] Step #5: Rust stderr: Step #5: /tmp/ivehhspgpr: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/bqoxsvdqcn: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ivehhspgpr: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/bqoxsvdqcn: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/ivehhspgpr", "-a", "sha384", "/tmp/bqoxsvdqcn"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/auqcbzvrpy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/auqcbzvrpy"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/auqcbzvrpy"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/auqcbzvrpy"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha224", "/tmp/tulzgptzqf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha224", "/tmp/tulzgptzqf"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha224", "/tmp/tulzgptzqf"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha224", "/tmp/tulzgptzqf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/hjjbswztvi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/hjjbswztvi"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/hjjbswztvi"] Step #5: Rust stderr: Step #5: /tmp/hjjbswztvi: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hjjbswztvi: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/hjjbswztvi"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "crc", "/tmp/melzwdtnec"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "crc", "/tmp/melzwdtnec"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "crc", "/tmp/melzwdtnec"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "crc", "/tmp/melzwdtnec"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "104", "-c", "-a", "crc", "/tmp/orbxtsvnza"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "104", "-c", "-a", "crc", "/tmp/orbxtsvnza"] Step #5: === Compare result for: cksum ["-l", "104", "-c", "-a", "crc", "/tmp/orbxtsvnza"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "104", "-c", "-a", "crc", "/tmp/orbxtsvnza"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "sha256", "/tmp/ablxaoibqr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "sha256", "/tmp/ablxaoibqr"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "sha256", "/tmp/ablxaoibqr"] Step #5: Rust stderr: Step #5: /tmp/ablxaoibqr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ablxaoibqr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "sha256", "/tmp/ablxaoibqr"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/uqwlxiawtg", "-a", "bsd", "/tmp/azaczhscww"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/uqwlxiawtg", "-a", "bsd", "/tmp/azaczhscww"] Step #5: === Compare result for: cksum ["-c", "/tmp/uqwlxiawtg", "-a", "bsd", "/tmp/azaczhscww"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/uqwlxiawtg", "-a", "bsd", "/tmp/azaczhscww"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "blake2b", "/tmp/sacjjsienp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "blake2b", "/tmp/sacjjsienp"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "blake2b", "/tmp/sacjjsienp"] Step #5: Rust stderr: Step #5: /tmp/sacjjsienp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sacjjsienp: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "blake2b", "/tmp/sacjjsienp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/ybfkjhfuji"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/ybfkjhfuji"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/ybfkjhfuji"] Step #5: Rust stderr: Step #5: /tmp/ybfkjhfuji: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ybfkjhfuji: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/ybfkjhfuji"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "448", "-c", "-a", "sm3", "/tmp/msxsxuefnn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "448", "-c", "-a", "sm3", "/tmp/msxsxuefnn"] Step #5: === Compare result for: cksum ["-l", "448", "-c", "-a", "sm3", "/tmp/msxsxuefnn"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "448", "-c", "-a", "sm3", "/tmp/msxsxuefnn"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/gkgwjpjmyc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/gkgwjpjmyc"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/gkgwjpjmyc"] Step #5: Rust stderr: Step #5: /tmp/gkgwjpjmyc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gkgwjpjmyc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/gkgwjpjmyc"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/vyackrmeku"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/vyackrmeku"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/vyackrmeku"] Step #5: Rust stderr: Step #5: /tmp/vyackrmeku: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vyackrmeku: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/vyackrmeku"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "sha384", "/tmp/hkjwbqedbp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "sha384", "/tmp/hkjwbqedbp"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "sha384", "/tmp/hkjwbqedbp"] Step #5: Rust stderr: Step #5: /tmp/hkjwbqedbp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hkjwbqedbp: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "sha384", "/tmp/hkjwbqedbp"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sha256", "/tmp/fsxljvagqy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sha256", "/tmp/fsxljvagqy"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sha256", "/tmp/fsxljvagqy"] Step #5: Rust stderr: Step #5: /tmp/fsxljvagqy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fsxljvagqy: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sha256", "/tmp/fsxljvagqy"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "296", "-c", "-a", "sha224", "/tmp/efroanqdsr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "296", "-c", "-a", "sha224", "/tmp/efroanqdsr"] Step #5: === Compare result for: cksum ["-l", "296", "-c", "-a", "sha224", "/tmp/efroanqdsr"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "296", "-c", "-a", "sha224", "/tmp/efroanqdsr"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-l", "374", "-c", "-a", "sysv", "/tmp/yzjsrvmqwp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-l", "374", "-c", "-a", "sysv", "/tmp/yzjsrvmqwp"] Step #5: === Compare result for: cksum ["-a", "sysv", "-l", "374", "-c", "-a", "sysv", "/tmp/yzjsrvmqwp"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-l", "374", "-c", "-a", "sysv", "/tmp/yzjsrvmqwp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/lzvxdlpwwf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/lzvxdlpwwf"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/lzvxdlpwwf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/lzvxdlpwwf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/ehummppsje"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/ehummppsje"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/ehummppsje"] Step #5: Rust stderr: Step #5: /tmp/ehummppsje: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ehummppsje: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/ehummppsje"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/onixcowlxb", "-a", "sysv", "/tmp/iqzqliafim"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/onixcowlxb", "-a", "sysv", "/tmp/iqzqliafim"] Step #5: === Compare result for: cksum ["-c", "/tmp/onixcowlxb", "-a", "sysv", "/tmp/iqzqliafim"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/onixcowlxb", "-a", "sysv", "/tmp/iqzqliafim"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/lmxvlexfjw", "-a", "blake2b", "/tmp/akpmwdqnon"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/lmxvlexfjw", "-a", "blake2b", "/tmp/akpmwdqnon"] Step #5: === Compare result for: cksum ["-c", "/tmp/lmxvlexfjw", "-a", "blake2b", "/tmp/akpmwdqnon"] Step #5: Rust stderr: Step #5: /tmp/lmxvlexfjw: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/akpmwdqnon: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lmxvlexfjw: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/akpmwdqnon: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/lmxvlexfjw", "-a", "blake2b", "/tmp/akpmwdqnon"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/jzjzncgilg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/jzjzncgilg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/jzjzncgilg"] Step #5: Rust stderr: Step #5: /tmp/jzjzncgilg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jzjzncgilg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/jzjzncgilg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/pwrgyckbek"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/pwrgyckbek"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/pwrgyckbek"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/pwrgyckbek"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sha512", "/tmp/ztlsbpjdyg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sha512", "/tmp/ztlsbpjdyg"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sha512", "/tmp/ztlsbpjdyg"] Step #5: Rust stderr: Step #5: /tmp/ztlsbpjdyg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ztlsbpjdyg: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sha512", "/tmp/ztlsbpjdyg"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "sha512", "/tmp/pnkfsvfdbv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "sha512", "/tmp/pnkfsvfdbv"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "sha512", "/tmp/pnkfsvfdbv"] Step #5: Rust stderr: Step #5: /tmp/pnkfsvfdbv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pnkfsvfdbv: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "sha512", "/tmp/pnkfsvfdbv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/rnuhjcchea", "-a", "bsd", "/tmp/edxtwutihy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/rnuhjcchea", "-a", "bsd", "/tmp/edxtwutihy"] Step #5: === Compare result for: cksum ["-c", "/tmp/rnuhjcchea", "-a", "bsd", "/tmp/edxtwutihy"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/rnuhjcchea", "-a", "bsd", "/tmp/edxtwutihy"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "sha512", "/tmp/jpyqggpupd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "sha512", "/tmp/jpyqggpupd"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "sha512", "/tmp/jpyqggpupd"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "sha512", "/tmp/jpyqggpupd"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "blake2b", "/tmp/tjxoookvkd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "blake2b", "/tmp/tjxoookvkd"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "blake2b", "/tmp/tjxoookvkd"] Step #5: Rust stderr: Step #5: /tmp/tjxoookvkd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tjxoookvkd: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "blake2b", "/tmp/tjxoookvkd"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "/tmp/wiraikhmgx", "-a", "sha256", "/tmp/fctmmbuebd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "/tmp/wiraikhmgx", "-a", "sha256", "/tmp/fctmmbuebd"] Step #5: === Compare result for: cksum ["--tag", "-c", "/tmp/wiraikhmgx", "-a", "sha256", "/tmp/fctmmbuebd"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "/tmp/wiraikhmgx", "-a", "sha256", "/tmp/fctmmbuebd"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "file_jÃ"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "file_jÃ"] Step #5: === Compare result for: cksum ["-a", "sha512", "file_jÃ"] Step #5: Rust stderr: Step #5: file_jÃ: No such file or directory Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_jÃ: No such file or directory Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "file_jÃ"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "-a", "sha512", "/tmp/kiiqsyaszq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "-a", "sha512", "/tmp/kiiqsyaszq"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "-a", "sha512", "/tmp/kiiqsyaszq"] Step #5: Rust stderr: Step #5: /tmp/kiiqsyaszq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kiiqsyaszq: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "-a", "sha512", "/tmp/kiiqsyaszq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/uqcizbuwlt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/uqcizbuwlt"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/uqcizbuwlt"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/uqcizbuwlt"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "md5", "/tmp/pkbhkwujto"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "md5", "/tmp/pkbhkwujto"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "md5", "/tmp/pkbhkwujto"] Step #5: Rust stderr: Step #5: /tmp/pkbhkwujto: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pkbhkwujto: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "md5", "/tmp/pkbhkwujto"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/fywbfpiqum"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/fywbfpiqum"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/fywbfpiqum"] Step #5: Rust stderr: Step #5: /tmp/fywbfpiqum: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fywbfpiqum: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/fywbfpiqum"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/fgmnmnwfrg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/fgmnmnwfrg"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/fgmnmnwfrg"] Step #5: Rust stderr: Step #5: /tmp/fgmnmnwfrg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fgmnmnwfrg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/fgmnmnwfrg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/nluoxslvmd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/nluoxslvmd"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/nluoxslvmd"] Step #5: Rust stderr: Step #5: /tmp/nluoxslvmd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/nluoxslvmd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/nluoxslvmd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/dfvkjzxjje", "-a", "blake2b", "/tmp/quyywrjdeg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/dfvkjzxjje", "-a", "blake2b", "/tmp/quyywrjdeg"] Step #5: === Compare result for: cksum ["-c", "/tmp/dfvkjzxjje", "-a", "blake2b", "/tmp/quyywrjdeg"] Step #5: Rust stderr: Step #5: /tmp/dfvkjzxjje: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/quyywrjdeg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dfvkjzxjje: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/quyywrjdeg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/dfvkjzxjje", "-a", "blake2b", "/tmp/quyywrjdeg"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "/tmp/engzmlqkya", "-a", "bsd", "/tmp/iysqqnliws"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "/tmp/engzmlqkya", "-a", "bsd", "/tmp/iysqqnliws"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "/tmp/engzmlqkya", "-a", "bsd", "/tmp/iysqqnliws"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "/tmp/engzmlqkya", "-a", "bsd", "/tmp/iysqqnliws"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/dmvsjpwsxb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/dmvsjpwsxb"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/dmvsjpwsxb"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/dmvsjpwsxb"] Step #5: Step #5: #64 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sysv", "--untagged", "-c", "-a", "sha1", "/tmp/menfgtgoau"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "--untagged", "-c", "-a", "sha1", "/tmp/menfgtgoau"] Step #5: === Compare result for: cksum ["-a", "sysv", "--untagged", "-c", "-a", "sha1", "/tmp/menfgtgoau"] Step #5: Rust stderr: Step #5: /tmp/menfgtgoau: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/menfgtgoau: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "--untagged", "-c", "-a", "sha1", "/tmp/menfgtgoau"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "blake2b", "/tmp/elnbpvidxh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "blake2b", "/tmp/elnbpvidxh"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "blake2b", "/tmp/elnbpvidxh"] Step #5: Rust stderr: Step #5: /tmp/elnbpvidxh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/elnbpvidxh: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "blake2b", "/tmp/elnbpvidxh"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "-a", "sha1", "/tmp/byztkboxzu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "-a", "sha1", "/tmp/byztkboxzu"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "-a", "sha1", "/tmp/byztkboxzu"] Step #5: Rust stderr: Step #5: /tmp/byztkboxzu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/byztkboxzu: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "-a", "sha1", "/tmp/byztkboxzu"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "blake2b", "/tmp/ksktluayks"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "blake2b", "/tmp/ksktluayks"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "blake2b", "/tmp/ksktluayks"] Step #5: Rust stderr: Step #5: /tmp/ksktluayks: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ksktluayks: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "blake2b", "/tmp/ksktluayks"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/aalmsdgaqk", "-a", "sha224", "/tmp/nerjxsawzm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/aalmsdgaqk", "-a", "sha224", "/tmp/nerjxsawzm"] Step #5: === Compare result for: cksum ["-c", "/tmp/aalmsdgaqk", "-a", "sha224", "/tmp/nerjxsawzm"] Step #5: Rust stderr: Step #5: /tmp/aalmsdgaqk: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/nerjxsawzm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/aalmsdgaqk: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/nerjxsawzm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/aalmsdgaqk", "-a", "sha224", "/tmp/nerjxsawzm"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "/tmp/quozcveher"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "/tmp/quozcveher"] Step #5: === Compare result for: cksum ["-a", "sha384", "/tmp/quozcveher"] Step #5: Rust stdout: Step #5: SHA384 (/tmp/quozcveher) = f69fae8cf34957da9bdeecafb4ed1a942223a1a9ac48a8b90322fdefe87542e6aab42ee582ccc540dcc0d324ef7f4cb7 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA384 (/tmp/quozcveher) = f69fae8cf34957da9bdeecafb4ed1a942223a1a9ac48a8b90322fdefe87542e6aab42ee582ccc540dcc0d324ef7f4cb7 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sha384", "/tmp/quozcveher"] Step #5: Step #5: thread '' (5276) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sha384", "/tmp/quozcveher"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5276== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x37,0x30,0x2e,0x37, Step #5: 70.7 Step #5: artifact_prefix='./'; Test unit written to ./crash-2ce42d3170ac7ff7638bbbe9fcb6a6f1f6222d25 Step #5: Base64: NzAuNw== Step #5: MERGE-OUTER: attempt 9 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765836818 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/2ce42d3170ac7ff7638bbbe9fcb6a6f1f6222d25' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 245 processed earlier; will process 179 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/unfmyagxkb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/unfmyagxkb"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/unfmyagxkb"] Step #5: Rust stderr: Step #5: /tmp/unfmyagxkb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/unfmyagxkb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/unfmyagxkb"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/lrpxvpalps", "-a", "sha1", "/tmp/tlmqchbrhd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/lrpxvpalps", "-a", "sha1", "/tmp/tlmqchbrhd"] Step #5: === Compare result for: cksum ["-c", "/tmp/lrpxvpalps", "-a", "sha1", "/tmp/tlmqchbrhd"] Step #5: Rust stderr: Step #5: /tmp/lrpxvpalps: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/tlmqchbrhd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lrpxvpalps: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/tlmqchbrhd: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/lrpxvpalps", "-a", "sha1", "/tmp/tlmqchbrhd"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "389", "-c", "-a", "sha256", "/tmp/ienjoypmbz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "389", "-c", "-a", "sha256", "/tmp/ienjoypmbz"] Step #5: === Compare result for: cksum ["-l", "389", "-c", "-a", "sha256", "/tmp/ienjoypmbz"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "389", "-c", "-a", "sha256", "/tmp/ienjoypmbz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "-a", "sha256", "/tmp/yrznagvkxx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "-a", "sha256", "/tmp/yrznagvkxx"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "-a", "sha256", "/tmp/yrznagvkxx"] Step #5: Rust stderr: Step #5: /tmp/yrznagvkxx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yrznagvkxx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "-a", "sha256", "/tmp/yrznagvkxx"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "/tmp/xbjogvqvri", "-a", "sysv", "/tmp/dmcvcpgwjx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "/tmp/xbjogvqvri", "-a", "sysv", "/tmp/dmcvcpgwjx"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "/tmp/xbjogvqvri", "-a", "sysv", "/tmp/dmcvcpgwjx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "/tmp/xbjogvqvri", "-a", "sysv", "/tmp/dmcvcpgwjx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/ckoaqckfad"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/ckoaqckfad"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/ckoaqckfad"] Step #5: Rust stderr: Step #5: /tmp/ckoaqckfad: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ckoaqckfad: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/ckoaqckfad"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "-a", "sha224", "/tmp/jtkjyebuzm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "-a", "sha224", "/tmp/jtkjyebuzm"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "-a", "sha224", "/tmp/jtkjyebuzm"] Step #5: Rust stderr: Step #5: /tmp/jtkjyebuzm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jtkjyebuzm: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "-a", "sha224", "/tmp/jtkjyebuzm"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/epowgvusep"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/epowgvusep"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/epowgvusep"] Step #5: Rust stderr: Step #5: /tmp/epowgvusep: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/epowgvusep: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/epowgvusep"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "426", "-c", "-a", "sm3", "/tmp/rteiexioba"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "426", "-c", "-a", "sm3", "/tmp/rteiexioba"] Step #5: === Compare result for: cksum ["-l", "426", "-c", "-a", "sm3", "/tmp/rteiexioba"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "426", "-c", "-a", "sm3", "/tmp/rteiexioba"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sha224", "/tmp/cibmahrnfa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sha224", "/tmp/cibmahrnfa"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sha224", "/tmp/cibmahrnfa"] Step #5: Rust stderr: Step #5: /tmp/cibmahrnfa: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cibmahrnfa: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sha224", "/tmp/cibmahrnfa"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "--base64", "-c", "-a", "blake2b", "/tmp/vwekmlkwkg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "--base64", "-c", "-a", "blake2b", "/tmp/vwekmlkwkg"] Step #5: === Compare result for: cksum ["-a", "sha512", "--base64", "-c", "-a", "blake2b", "/tmp/vwekmlkwkg"] Step #5: Rust stderr: Step #5: /tmp/vwekmlkwkg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vwekmlkwkg: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "--base64", "-c", "-a", "blake2b", "/tmp/vwekmlkwkg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/gmozbuhniq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/gmozbuhniq"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/gmozbuhniq"] Step #5: Rust stderr: Step #5: /tmp/gmozbuhniq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gmozbuhniq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/gmozbuhniq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/odfugumqnj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/odfugumqnj"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/odfugumqnj"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/odfugumqnj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/inrqpfsmcj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/inrqpfsmcj"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/inrqpfsmcj"] Step #5: Rust stderr: Step #5: /tmp/inrqpfsmcj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/inrqpfsmcj: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/inrqpfsmcj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/xkagybcpyj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha224", "/tmp/xkagybcpyj"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/xkagybcpyj"] Step #5: Rust stderr: Step #5: /tmp/xkagybcpyj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xkagybcpyj: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha224", "/tmp/xkagybcpyj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "/tmp/bljoukeczm", "-a", "bsd", "/tmp/odlsfaneqp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "/tmp/bljoukeczm", "-a", "bsd", "/tmp/odlsfaneqp"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "/tmp/bljoukeczm", "-a", "bsd", "/tmp/odlsfaneqp"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "/tmp/bljoukeczm", "-a", "bsd", "/tmp/odlsfaneqp"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/eujzvhksyd", "-a", "sha1", "/tmp/shecyomrif"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/eujzvhksyd", "-a", "sha1", "/tmp/shecyomrif"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/eujzvhksyd", "-a", "sha1", "/tmp/shecyomrif"] Step #5: Rust stderr: Step #5: /tmp/eujzvhksyd: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/shecyomrif: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eujzvhksyd: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/shecyomrif: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/eujzvhksyd", "-a", "sha1", "/tmp/shecyomrif"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "/tmp/pbifrqxgdk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "/tmp/pbifrqxgdk"] Step #5: === Compare result for: cksum ["-a", "sm3", "/tmp/pbifrqxgdk"] Step #5: Rust stdout: Step #5: SM3 (/tmp/pbifrqxgdk) = 8b4b0f03ad264119c41145bba53029d284d88985f72dba6c76c235b4ec71f1e5 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SM3 (/tmp/pbifrqxgdk) = 8b4b0f03ad264119c41145bba53029d284d88985f72dba6c76c235b4ec71f1e5 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "sm3", "/tmp/pbifrqxgdk"] Step #5: Step #5: thread '' (7040) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "sm3", "/tmp/pbifrqxgdk"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7040== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6c,0x6f,0x67,0x69,0xa1, Step #5: logi\241 Step #5: artifact_prefix='./'; Test unit written to ./crash-b747f0f0d778aa1d944d79e5c5f905c4642c6c6e Step #5: Base64: bG9naaE= Step #5: MERGE-OUTER: attempt 10 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765906601 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/b747f0f0d778aa1d944d79e5c5f905c4642c6c6e' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 263 processed earlier; will process 161 files now Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/fqoqxggbjy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/fqoqxggbjy"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/fqoqxggbjy"] Step #5: Rust stderr: Step #5: /tmp/fqoqxggbjy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fqoqxggbjy: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/fqoqxggbjy"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "/tmp/hbzwprasno", "-a", "sha224", "/tmp/wogyvubhpv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "/tmp/hbzwprasno", "-a", "sha224", "/tmp/wogyvubhpv"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "/tmp/hbzwprasno", "-a", "sha224", "/tmp/wogyvubhpv"] Step #5: Rust stderr: Step #5: /tmp/hbzwprasno: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/wogyvubhpv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hbzwprasno: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/wogyvubhpv: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "/tmp/hbzwprasno", "-a", "sha224", "/tmp/wogyvubhpv"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sm3", "/tmp/wkmasgwhzt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sm3", "/tmp/wkmasgwhzt"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sm3", "/tmp/wkmasgwhzt"] Step #5: Rust stderr: Step #5: /tmp/wkmasgwhzt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wkmasgwhzt: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sm3", "/tmp/wkmasgwhzt"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/sbqwljkcha"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/sbqwljkcha"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/sbqwljkcha"] Step #5: Rust stderr: Step #5: /tmp/sbqwljkcha: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sbqwljkcha: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/sbqwljkcha"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/devnmbgice"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/devnmbgice"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/devnmbgice"] Step #5: Rust stderr: Step #5: /tmp/devnmbgice: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/devnmbgice: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/devnmbgice"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/dgdsrhdxes"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/dgdsrhdxes"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/dgdsrhdxes"] Step #5: Rust stderr: Step #5: /tmp/dgdsrhdxes: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dgdsrhdxes: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/dgdsrhdxes"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/rrqppuahmx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/rrqppuahmx"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/rrqppuahmx"] Step #5: Rust stderr: Step #5: /tmp/rrqppuahmx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rrqppuahmx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/rrqppuahmx"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "/tmp/pxnrbqfwbs", "-a", "bsd", "/tmp/tqonpqgxzx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "/tmp/pxnrbqfwbs", "-a", "bsd", "/tmp/tqonpqgxzx"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "/tmp/pxnrbqfwbs", "-a", "bsd", "/tmp/tqonpqgxzx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "/tmp/pxnrbqfwbs", "-a", "bsd", "/tmp/tqonpqgxzx"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/debxnyavto"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/debxnyavto"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/debxnyavto"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/debxnyavto"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yousrsrvhh", "-a", "sha1", "/tmp/rvoypcvcjo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yousrsrvhh", "-a", "sha1", "/tmp/rvoypcvcjo"] Step #5: === Compare result for: cksum ["-c", "/tmp/yousrsrvhh", "-a", "sha1", "/tmp/rvoypcvcjo"] Step #5: Rust stderr: Step #5: /tmp/yousrsrvhh: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/rvoypcvcjo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yousrsrvhh: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/rvoypcvcjo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yousrsrvhh", "-a", "sha1", "/tmp/rvoypcvcjo"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-a", "sha1", "/tmp/bbmqlqouwz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-a", "sha1", "/tmp/bbmqlqouwz"] Step #5: === Compare result for: cksum ["-a", "crc", "-a", "sha1", "/tmp/bbmqlqouwz"] Step #5: Rust stdout: Step #5: SHA1 (/tmp/bbmqlqouwz) = 046749d0156167522b9f8c1cbbb1cf96129d15e4 Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -SHA1 (/tmp/bbmqlqouwz) = 046749d0156167522b9f8c1cbbb1cf96129d15e4 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 0, GNU: 1) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: cksum ["-a", "crc", "-a", "sha1", "/tmp/bbmqlqouwz"] Step #5: Step #5: thread '' (7399) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["-a", "crc", "-a", "sha1", "/tmp/bbmqlqouwz"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7399== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x70,0x61,0x73,0x73,0x89, Step #5: pass\211 Step #5: artifact_prefix='./'; Test unit written to ./crash-5c562360dfeab704a5e4cbe0eace6e5dbc3b9162 Step #5: Base64: cGFzc4k= Step #5: MERGE-OUTER: attempt 11 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765951739 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/5c562360dfeab704a5e4cbe0eace6e5dbc3b9162' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 274 processed earlier; will process 150 files now Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "/tmp/wocjweydap", "-a", "sha1", "/tmp/cewnnfcisx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "/tmp/wocjweydap", "-a", "sha1", "/tmp/cewnnfcisx"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "/tmp/wocjweydap", "-a", "sha1", "/tmp/cewnnfcisx"] Step #5: Rust stderr: Step #5: /tmp/wocjweydap: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/cewnnfcisx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wocjweydap: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/cewnnfcisx: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "/tmp/wocjweydap", "-a", "sha1", "/tmp/cewnnfcisx"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "blake2b", "--untagged", "-l", "176", "-a", "md5", "/tmp/znhvevmiiw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "--untagged", "-l", "176", "-a", "md5", "/tmp/znhvevmiiw"] Step #5: === Compare result for: cksum ["-a", "blake2b", "--untagged", "-l", "176", "-a", "md5", "/tmp/znhvevmiiw"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "--untagged", "-l", "176", "-a", "md5", "/tmp/znhvevmiiw"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/plsvpoifra"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/plsvpoifra"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/plsvpoifra"] Step #5: Rust stderr: Step #5: /tmp/plsvpoifra: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/plsvpoifra: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/plsvpoifra"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/lshatioeax"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/lshatioeax"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/lshatioeax"] Step #5: Rust stderr: Step #5: /tmp/lshatioeax: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lshatioeax: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/lshatioeax"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sha512", "/tmp/qxeolwxxkj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sha512", "/tmp/qxeolwxxkj"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sha512", "/tmp/qxeolwxxkj"] Step #5: Rust stderr: Step #5: /tmp/qxeolwxxkj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qxeolwxxkj: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sha512", "/tmp/qxeolwxxkj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/adnafnadhg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/adnafnadhg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/adnafnadhg"] Step #5: Rust stderr: Step #5: /tmp/adnafnadhg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/adnafnadhg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/adnafnadhg"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "md5", "/tmp/fgifvmejod"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "md5", "/tmp/fgifvmejod"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "md5", "/tmp/fgifvmejod"] Step #5: Rust stderr: Step #5: /tmp/fgifvmejod: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fgifvmejod: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "md5", "/tmp/fgifvmejod"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/bapzndutwk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/bapzndutwk"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/bapzndutwk"] Step #5: Rust stderr: Step #5: /tmp/bapzndutwk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bapzndutwk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/bapzndutwk"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/jfbwtbdpqb", "-a", "sha384", "/tmp/buspcjdsce"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/jfbwtbdpqb", "-a", "sha384", "/tmp/buspcjdsce"] Step #5: === Compare result for: cksum ["-c", "/tmp/jfbwtbdpqb", "-a", "sha384", "/tmp/buspcjdsce"] Step #5: Rust stderr: Step #5: /tmp/jfbwtbdpqb: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/buspcjdsce: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jfbwtbdpqb: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/buspcjdsce: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/jfbwtbdpqb", "-a", "sha384", "/tmp/buspcjdsce"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/alyjpomxkv", "-a", "sysv", "/tmp/ppavoqhnil"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/alyjpomxkv", "-a", "sysv", "/tmp/ppavoqhnil"] Step #5: === Compare result for: cksum ["-c", "/tmp/alyjpomxkv", "-a", "sysv", "/tmp/ppavoqhnil"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/alyjpomxkv", "-a", "sysv", "/tmp/ppavoqhnil"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "/tmp/mrmsjheelw", "-a", "sha512", "/tmp/zthrrxxrkc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "/tmp/mrmsjheelw", "-a", "sha512", "/tmp/zthrrxxrkc"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "/tmp/mrmsjheelw", "-a", "sha512", "/tmp/zthrrxxrkc"] Step #5: Rust stderr: Step #5: /tmp/mrmsjheelw: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/zthrrxxrkc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mrmsjheelw: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/zthrrxxrkc: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "/tmp/mrmsjheelw", "-a", "sha512", "/tmp/zthrrxxrkc"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha384", "/tmp/uvspnstzkg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha384", "/tmp/uvspnstzkg"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha384", "/tmp/uvspnstzkg"] Step #5: Rust stderr: Step #5: /tmp/uvspnstzkg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uvspnstzkg: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha384", "/tmp/uvspnstzkg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/tcyojwwkms"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/tcyojwwkms"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/tcyojwwkms"] Step #5: Rust stderr: Step #5: /tmp/tcyojwwkms: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tcyojwwkms: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/tcyojwwkms"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/enruityuoq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/enruityuoq"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/enruityuoq"] Step #5: Rust stderr: Step #5: /tmp/enruityuoq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/enruityuoq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/enruityuoq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/njjkgasdpg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/njjkgasdpg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/njjkgasdpg"] Step #5: Rust stderr: Step #5: /tmp/njjkgasdpg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/njjkgasdpg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/njjkgasdpg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/nqyhtpkvis"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/nqyhtpkvis"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/nqyhtpkvis"] Step #5: Rust stderr: Step #5: /tmp/nqyhtpkvis: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/nqyhtpkvis: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/nqyhtpkvis"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/rmpuegsgwv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/rmpuegsgwv"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/rmpuegsgwv"] Step #5: Rust stderr: Step #5: /tmp/rmpuegsgwv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rmpuegsgwv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/rmpuegsgwv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/arhgohqgdx", "-a", "blake2b", "/tmp/xdhnhfuiwn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/arhgohqgdx", "-a", "blake2b", "/tmp/xdhnhfuiwn"] Step #5: MERGE-OUTER: attempt 12 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766020987 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/ca2175c3f18731ed961b160595c53582410b40ee' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 292 processed earlier; will process 132 files now Step #5: === TEST cksum ["cksum", "file_⚙5Uv", "file_", "/tmp/malrphivee"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_⚙5Uv", "file_", "/tmp/malrphivee"] Step #5: === Compare result for: cksum ["file_⚙5Uv", "file_", "/tmp/malrphivee"] Step #5: Rust stderr: Step #5: file_⚙5Uv: No such file or directory Step #5: fuzz_cksum: file_: No such file or directory Step #5: GNU stderr: Step #5: 'file_'$'\342\232\231''5Uv': No such file or directory Step #5: cksum: file_: No such file or directory Step #5: --- START diff Step #5: -file_⚙5Uv: No such file or directory Step #5: -fuzz_cksum: file_: No such file or directory Step #5: +'file_'$'\342\232\231''5Uv': No such file or directory Step #5: +cksum: file_: No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["file_⚙5Uv", "file_", "/tmp/malrphivee"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sysv", "--binary", "-c", "-a", "sm3", "/tmp/urffbekwsa"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "--binary", "-c", "-a", "sm3", "/tmp/urffbekwsa"] Step #5: === Compare result for: cksum ["-a", "sysv", "--binary", "-c", "-a", "sm3", "/tmp/urffbekwsa"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "--binary", "-c", "-a", "sm3", "/tmp/urffbekwsa"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/kdimyhzvbc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/kdimyhzvbc"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/kdimyhzvbc"] Step #5: Rust stderr: Step #5: /tmp/kdimyhzvbc: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kdimyhzvbc: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/kdimyhzvbc"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/emtkxokdol"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/emtkxokdol"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/emtkxokdol"] Step #5: Rust stderr: Step #5: /tmp/emtkxokdol: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/emtkxokdol: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/emtkxokdol"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-l", "404", "-c", "-a", "sha1", "/tmp/xghrafdgpe"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "404", "-c", "-a", "sha1", "/tmp/xghrafdgpe"] Step #5: === Compare result for: cksum ["-l", "404", "-c", "-a", "sha1", "/tmp/xghrafdgpe"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "404", "-c", "-a", "sha1", "/tmp/xghrafdgpe"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "sm3", "/tmp/paxczxcffr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "sm3", "/tmp/paxczxcffr"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "sm3", "/tmp/paxczxcffr"] Step #5: Rust stderr: Step #5: /tmp/paxczxcffr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/paxczxcffr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "sm3", "/tmp/paxczxcffr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/dbltczddin"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/dbltczddin"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/dbltczddin"] Step #5: Rust stderr: Step #5: /tmp/dbltczddin: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dbltczddin: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/dbltczddin"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/wxcaeszmme"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/wxcaeszmme"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/wxcaeszmme"] Step #5: Rust stderr: Step #5: /tmp/wxcaeszmme: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wxcaeszmme: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/wxcaeszmme"] Step #5: Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/xajtdjdetd", "-a", "sha512", "/tmp/ysawicugnl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/xajtdjdetd", "-a", "sha512", "/tmp/ysawicugnl"] Step #5: === Compare result for: cksum ["-c", "/tmp/xajtdjdetd", "-a", "sha512", "/tmp/ysawicugnl"] Step #5: Rust stderr: Step #5: /tmp/xajtdjdetd: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/ysawicugnl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xajtdjdetd: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/ysawicugnl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/xajtdjdetd", "-a", "sha512", "/tmp/ysawicugnl"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha384", "/tmp/jokvixaplt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha384", "/tmp/jokvixaplt"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha384", "/tmp/jokvixaplt"] Step #5: Rust stderr: Step #5: /tmp/jokvixaplt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/jokvixaplt: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha384", "/tmp/jokvixaplt"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "/tmp/jyqpftihbs", "-a", "sha256", "/tmp/sleaecisao"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "/tmp/jyqpftihbs", "-a", "sha256", "/tmp/sleaecisao"] Step #5: === Compare result for: cksum ["--binary", "-c", "/tmp/jyqpftihbs", "-a", "sha256", "/tmp/sleaecisao"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "/tmp/jyqpftihbs", "-a", "sha256", "/tmp/sleaecisao"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-l", "310", "-c", "/tmp/iosrgckjml", "-a", "sysv", "/tmp/bckrcooamk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-l", "310", "-c", "/tmp/iosrgckjml", "-a", "sysv", "/tmp/bckrcooamk"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-l", "310", "-c", "/tmp/iosrgckjml", "-a", "sysv", "/tmp/bckrcooamk"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-l", "310", "-c", "/tmp/iosrgckjml", "-a", "sysv", "/tmp/bckrcooamk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/dpdqnwbqnl", "-a", "sha384", "/tmp/thnxajfhal"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/dpdqnwbqnl", "-a", "sha384", "/tmp/thnxajfhal"] Step #5: === Compare result for: cksum ["-c", "/tmp/dpdqnwbqnl", "-a", "sha384", "/tmp/thnxajfhal"] Step #5: Rust stderr: Step #5: /tmp/dpdqnwbqnl: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/thnxajfhal: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dpdqnwbqnl: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/thnxajfhal: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/dpdqnwbqnl", "-a", "sha384", "/tmp/thnxajfhal"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/bdyffouoqw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/bdyffouoqw"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/bdyffouoqw"] Step #5: Rust stderr: Step #5: /tmp/bdyffouoqw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bdyffouoqw: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/bdyffouoqw"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/tqbfdhunaf", "-a", "md5", "/tmp/ecawmfjqxx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/tqbfdhunaf", "-a", "md5", "/tmp/ecawmfjqxx"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/tqbfdhunaf", "-a", "md5", "/tmp/ecawmfjqxx"] Step #5: Rust stderr: Step #5: /tmp/tqbfdhunaf: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/ecawmfjqxx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tqbfdhunaf: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/ecawmfjqxx: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/tqbfdhunaf", "-a", "md5", "/tmp/ecawmfjqxx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/zcwnsxtmpm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/zcwnsxtmpm"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/zcwnsxtmpm"] Step #5: Rust stderr: Step #5: /tmp/zcwnsxtmpm: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zcwnsxtmpm: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/zcwnsxtmpm"] Step #5: Step #5: #16 pulse exec/s: 0 rss: 30Mb Step #5: === TEST cksum ["cksum", "-c", "/tmp/vlylchkkmz", "-a", "sha384", "/tmp/govrtzgwhj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/vlylchkkmz", "-a", "sha384", "/tmp/govrtzgwhj"] Step #5: === Compare result for: cksum ["-c", "/tmp/vlylchkkmz", "-a", "sha384", "/tmp/govrtzgwhj"] Step #5: Rust stderr: Step #5: /tmp/vlylchkkmz: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/govrtzgwhj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vlylchkkmz: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/govrtzgwhj: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/vlylchkkmz", "-a", "sha384", "/tmp/govrtzgwhj"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha384", "/tmp/vtpmdiyaew"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha384", "/tmp/vtpmdiyaew"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha384", "/tmp/vtpmdiyaew"] Step #5: Rust stderr: Step #5: /tmp/vtpmdiyaew: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vtpmdiyaew: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha384", "/tmp/vtpmdiyaew"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "/tmp/buxrorjcsm", "-a", "sha512", "/tmp/eossmypixe"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "/tmp/buxrorjcsm", "-a", "sha512", "/tmp/eossmypixe"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "/tmp/buxrorjcsm", "-a", "sha512", "/tmp/eossmypixe"] Step #5: Rust stderr: Step #5: /tmp/buxrorjcsm: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/eossmypixe: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/buxrorjcsm: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/eossmypixe: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "/tmp/buxrorjcsm", "-a", "sha512", "/tmp/eossmypixe"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "--untagged", "-c", "/tmp/vjfuvcclpi", "-a", "crc", "/tmp/bexlffhihn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "--untagged", "-c", "/tmp/vjfuvcclpi", "-a", "crc", "/tmp/bexlffhihn"] Step #5: === Compare result for: cksum ["-a", "blake2b", "--untagged", "-c", "/tmp/vjfuvcclpi", "-a", "crc", "/tmp/bexlffhihn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "--untagged", "-c", "/tmp/vjfuvcclpi", "-a", "crc", "/tmp/bexlffhihn"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "bsd", "/tmp/wnmeweastg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "bsd", "/tmp/wnmeweastg"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "bsd", "/tmp/wnmeweastg"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "bsd", "/tmp/wnmeweastg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/oqugyjqdeh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/oqugyjqdeh"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/oqugyjqdeh"] Step #5: Rust stderr: Step #5: /tmp/oqugyjqdeh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/oqugyjqdeh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/oqugyjqdeh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/aypksmyvkv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/aypksmyvkv"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/aypksmyvkv"] Step #5: Rust stderr: Step #5: /tmp/aypksmyvkv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/aypksmyvkv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/aypksmyvkv"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sm3", "/tmp/tizpwiinuf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sm3", "/tmp/tizpwiinuf"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sm3", "/tmp/tizpwiinuf"] Step #5: Rust stderr: Step #5: /tmp/tizpwiinuf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tizpwiinuf: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sm3", "/tmp/tizpwiinuf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "/tmp/gjhrbluque", "-a", "sysv", "/tmp/yagqofgbrx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "/tmp/gjhrbluque", "-a", "sysv", "/tmp/yagqofgbrx"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "/tmp/gjhrbluque", "-a", "sysv", "/tmp/yagqofgbrx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "/tmp/gjhrbluque", "-a", "sysv", "/tmp/yagqofgbrx"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/goyxxphawp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "blake2b", "/tmp/goyxxphawp"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/goyxxphawp"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "blake2b", "/tmp/goyxxphawp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/wuxwkkqepx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/wuxwkkqepx"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/wuxwkkqepx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/wuxwkkqepx"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "446", "-c", "/tmp/weuxpmceza", "-a", "sha512", "/tmp/xnpjgjvfmu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "446", "-c", "/tmp/weuxpmceza", "-a", "sha512", "/tmp/xnpjgjvfmu"] Step #5: === Compare result for: cksum ["-l", "446", "-c", "/tmp/weuxpmceza", "-a", "sha512", "/tmp/xnpjgjvfmu"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "446", "-c", "/tmp/weuxpmceza", "-a", "sha512", "/tmp/xnpjgjvfmu"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-l", "81", "-c", "-a", "crc", "/tmp/hmeulugyjs"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-l", "81", "-c", "-a", "crc", "/tmp/hmeulugyjs"] Step #5: === Compare result for: cksum ["--text", "-l", "81", "-c", "-a", "crc", "/tmp/hmeulugyjs"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-l", "81", "-c", "-a", "crc", "/tmp/hmeulugyjs"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/qsoyluwqsm", "-a", "sha1", "/tmp/wsewxbfstv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/qsoyluwqsm", "-a", "sha1", "/tmp/wsewxbfstv"] Step #5: === Compare result for: cksum ["-c", "/tmp/qsoyluwqsm", "-a", "sha1", "/tmp/wsewxbfstv"] Step #5: Rust stderr: Step #5: /tmp/qsoyluwqsm: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/wsewxbfstv: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qsoyluwqsm: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/wsewxbfstv: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/qsoyluwqsm", "-a", "sha1", "/tmp/wsewxbfstv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/krcrmhjgmr", "-a", "bsd", "/tmp/zxctmbblpv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/krcrmhjgmr", "-a", "bsd", "/tmp/zxctmbblpv"] Step #5: === Compare result for: cksum ["-c", "/tmp/krcrmhjgmr", "-a", "bsd", "/tmp/zxctmbblpv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/krcrmhjgmr", "-a", "bsd", "/tmp/zxctmbblpv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/lulxjltujd", "-a", "sm3", "/tmp/wbieswynjr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/lulxjltujd", "-a", "sm3", "/tmp/wbieswynjr"] Step #5: === Compare result for: cksum ["-c", "/tmp/lulxjltujd", "-a", "sm3", "/tmp/wbieswynjr"] Step #5: Rust stderr: Step #5: /tmp/lulxjltujd: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/wbieswynjr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lulxjltujd: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/wbieswynjr: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/lulxjltujd", "-a", "sm3", "/tmp/wbieswynjr"] Step #5: Step #5: #32 pulse exec/s: 0 rss: 30Mb Step #5: === TEST cksum ["cksum", "file_E"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_E"] Step #5: === Compare result for: cksum ["file_E"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/bjzbiieqcv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/bjzbiieqcv"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/bjzbiieqcv"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/bjzbiieqcv"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-l", "376", "-c", "/tmp/xufdkkefdp", "-a", "sha1", "/tmp/cudubtrtuu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-l", "376", "-c", "/tmp/xufdkkefdp", "-a", "sha1", "/tmp/cudubtrtuu"] Step #5: === Compare result for: cksum ["-a", "sha256", "-l", "376", "-c", "/tmp/xufdkkefdp", "-a", "sha1", "/tmp/cudubtrtuu"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-l", "376", "-c", "/tmp/xufdkkefdp", "-a", "sha1", "/tmp/cudubtrtuu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/xlvvraqyth", "-a", "sha256", "/tmp/ifcmecrvss"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/xlvvraqyth", "-a", "sha256", "/tmp/ifcmecrvss"] Step #5: === Compare result for: cksum ["-c", "/tmp/xlvvraqyth", "-a", "sha256", "/tmp/ifcmecrvss"] Step #5: Rust stderr: Step #5: /tmp/xlvvraqyth: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/ifcmecrvss: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xlvvraqyth: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/ifcmecrvss: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/xlvvraqyth", "-a", "sha256", "/tmp/ifcmecrvss"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "326", "-c", "-a", "blake2b", "/tmp/pwuzpyxqiv"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "326", "-c", "-a", "blake2b", "/tmp/pwuzpyxqiv"] Step #5: === Compare result for: cksum ["-l", "326", "-c", "-a", "blake2b", "/tmp/pwuzpyxqiv"] Step #5: Rust stderr: Step #5: invalid length: '326' Step #5: fuzz_cksum: length is not a multiple of 8 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -invalid length: '326' Step #5: -fuzz_cksum: length is not a multiple of 8 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "326", "-c", "-a", "blake2b", "/tmp/pwuzpyxqiv"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/gnbkcmqngh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/gnbkcmqngh"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/gnbkcmqngh"] Step #5: Rust stderr: Step #5: /tmp/gnbkcmqngh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/gnbkcmqngh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/gnbkcmqngh"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "sha384", "/tmp/sqddgwtinp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "sha384", "/tmp/sqddgwtinp"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "sha384", "/tmp/sqddgwtinp"] Step #5: Rust stderr: Step #5: /tmp/sqddgwtinp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sqddgwtinp: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "sha384", "/tmp/sqddgwtinp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/liahbbgfhl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/liahbbgfhl"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/liahbbgfhl"] Step #5: Rust stderr: Step #5: /tmp/liahbbgfhl: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/liahbbgfhl: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/liahbbgfhl"] Step #5: Step #5: === TEST cksum ["cksum", "--untagged", "-c", "-a", "blake2b", "/tmp/chujekiban"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--untagged", "-c", "-a", "blake2b", "/tmp/chujekiban"] Step #5: === Compare result for: cksum ["--untagged", "-c", "-a", "blake2b", "/tmp/chujekiban"] Step #5: Rust stderr: Step #5: /tmp/chujekiban: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--untagged' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/chujekiban: no properly formatted checksum lines found Step #5: +unrecognized option '--untagged' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--untagged", "-c", "-a", "blake2b", "/tmp/chujekiban"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "bsd", "/tmp/ninovbdpxp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "bsd", "/tmp/ninovbdpxp"] Step #5: === Compare result for: cksum ["-c", "-a", "bsd", "/tmp/ninovbdpxp"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "bsd", "/tmp/ninovbdpxp"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "sha224", "/tmp/ptlhyuwweo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "sha224", "/tmp/ptlhyuwweo"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "sha224", "/tmp/ptlhyuwweo"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "sha224", "/tmp/ptlhyuwweo"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "296", "-c", "/tmp/amznihhvfd", "-a", "md5", "/tmp/endwunlaye"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "296", "-c", "/tmp/amznihhvfd", "-a", "md5", "/tmp/endwunlaye"] Step #5: === Compare result for: cksum ["-l", "296", "-c", "/tmp/amznihhvfd", "-a", "md5", "/tmp/endwunlaye"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "296", "-c", "/tmp/amznihhvfd", "-a", "md5", "/tmp/endwunlaye"] Step #5: Step #5: === TEST cksum ["cksum", "file_Jip"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_Jip"] Step #5: === Compare result for: cksum ["file_Jip"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/dbbiyqdbwj"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/dbbiyqdbwj"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/dbbiyqdbwj"] Step #5: Rust stderr: Step #5: /tmp/dbbiyqdbwj: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dbbiyqdbwj: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/dbbiyqdbwj"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/uumtamutxr", "-a", "bsd", "/tmp/ciiebwxuyf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/uumtamutxr", "-a", "bsd", "/tmp/ciiebwxuyf"] Step #5: === Compare result for: cksum ["-c", "/tmp/uumtamutxr", "-a", "bsd", "/tmp/ciiebwxuyf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/uumtamutxr", "-a", "bsd", "/tmp/ciiebwxuyf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha1", "/tmp/pjeqipbtas"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha1", "/tmp/pjeqipbtas"] Step #5: === Compare result for: cksum ["-c", "-a", "sha1", "/tmp/pjeqipbtas"] Step #5: Rust stderr: Step #5: /tmp/pjeqipbtas: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/pjeqipbtas: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha1", "/tmp/pjeqipbtas"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha1", "/tmp/rplexadgom"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha1", "/tmp/rplexadgom"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha1", "/tmp/rplexadgom"] Step #5: Rust stderr: Step #5: /tmp/rplexadgom: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rplexadgom: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha1", "/tmp/rplexadgom"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "-c", "/tmp/wemptiucsj", "-a", "md5", "/tmp/laqkhkbrhw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "-c", "/tmp/wemptiucsj", "-a", "md5", "/tmp/laqkhkbrhw"] Step #5: === Compare result for: cksum ["-a", "crc", "-c", "/tmp/wemptiucsj", "-a", "md5", "/tmp/laqkhkbrhw"] Step #5: Rust stderr: Step #5: /tmp/wemptiucsj: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/laqkhkbrhw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wemptiucsj: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/laqkhkbrhw: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "-c", "/tmp/wemptiucsj", "-a", "md5", "/tmp/laqkhkbrhw"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/yqhoggeblo", "-a", "sysv", "/tmp/jbbukcngoi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/yqhoggeblo", "-a", "sysv", "/tmp/jbbukcngoi"] Step #5: === Compare result for: cksum ["-c", "/tmp/yqhoggeblo", "-a", "sysv", "/tmp/jbbukcngoi"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/yqhoggeblo", "-a", "sysv", "/tmp/jbbukcngoi"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sysv", "/tmp/onjfzmipbm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sysv", "/tmp/onjfzmipbm"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sysv", "/tmp/onjfzmipbm"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sysv", "/tmp/onjfzmipbm"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "--text", "-c", "-a", "sha1", "/tmp/jfycyttrly"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "--text", "-c", "-a", "sha1", "/tmp/jfycyttrly"] Step #5: === Compare result for: cksum ["-a", "md5", "--text", "-c", "-a", "sha1", "/tmp/jfycyttrly"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "--text", "-c", "-a", "sha1", "/tmp/jfycyttrly"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "crc", "/tmp/qldbqkecas"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "crc", "/tmp/qldbqkecas"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "crc", "/tmp/qldbqkecas"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "crc", "/tmp/qldbqkecas"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "246", "-c", "-a", "sha224", "/tmp/ennkudmtci"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "246", "-c", "-a", "sha224", "/tmp/ennkudmtci"] Step #5: === Compare result for: cksum ["-l", "246", "-c", "-a", "sha224", "/tmp/ennkudmtci"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "246", "-c", "-a", "sha224", "/tmp/ennkudmtci"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "sha256", "/tmp/xghxjcvvif"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "sha256", "/tmp/xghxjcvvif"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "sha256", "/tmp/xghxjcvvif"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "sha256", "/tmp/xghxjcvvif"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "sha256", "/tmp/ojnwgmfriu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "sha256", "/tmp/ojnwgmfriu"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "sha256", "/tmp/ojnwgmfriu"] Step #5: Rust stderr: Step #5: /tmp/ojnwgmfriu: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ojnwgmfriu: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "sha256", "/tmp/ojnwgmfriu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/feitegldmx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/feitegldmx"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/feitegldmx"] Step #5: Rust stderr: Step #5: /tmp/feitegldmx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/feitegldmx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/feitegldmx"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/nkxmccxnes", "-a", "blake2b", "/tmp/kdckzytbsb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/nkxmccxnes", "-a", "blake2b", "/tmp/kdckzytbsb"] Step #5: === Compare result for: cksum ["-c", "/tmp/nkxmccxnes", "-a", "blake2b", "/tmp/kdckzytbsb"] Step #5: Rust stderr: Step #5: /tmp/nkxmccxnes: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/kdckzytbsb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/nkxmccxnes: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/kdckzytbsb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/nkxmccxnes", "-a", "blake2b", "/tmp/kdckzytbsb"] Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "-a", "crc", "/tmp/rdborhitcr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "-a", "crc", "/tmp/rdborhitcr"] Step #5: === Compare result for: cksum ["--raw", "-c", "-a", "crc", "/tmp/rdborhitcr"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "-a", "crc", "/tmp/rdborhitcr"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sha256", "/tmp/dzeihvpokd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sha256", "/tmp/dzeihvpokd"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sha256", "/tmp/dzeihvpokd"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sha256", "/tmp/dzeihvpokd"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "bsd", "/tmp/afvjjbmpjx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "bsd", "/tmp/afvjjbmpjx"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "bsd", "/tmp/afvjjbmpjx"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "bsd", "/tmp/afvjjbmpjx"] Step #5: Step #5: === TEST cksum ["cksum", "file_"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_"] Step #5: === Compare result for: cksum ["file_"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/fsvywgdqfq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/fsvywgdqfq"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/fsvywgdqfq"] Step #5: Rust stderr: Step #5: /tmp/fsvywgdqfq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fsvywgdqfq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/fsvywgdqfq"] Step #5: Step #5: #64 pulse exec/s: 0 rss: 30Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/rqcaslqift"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/rqcaslqift"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/rqcaslqift"] Step #5: Rust stderr: Step #5: /tmp/rqcaslqift: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rqcaslqift: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/rqcaslqift"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "/tmp/zklcjgkxzd", "-a", "sm3", "/tmp/tlnqhdkulg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "/tmp/zklcjgkxzd", "-a", "sm3", "/tmp/tlnqhdkulg"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "/tmp/zklcjgkxzd", "-a", "sm3", "/tmp/tlnqhdkulg"] Step #5: Rust stderr: Step #5: /tmp/zklcjgkxzd: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/tlnqhdkulg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/zklcjgkxzd: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/tlnqhdkulg: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "/tmp/zklcjgkxzd", "-a", "sm3", "/tmp/tlnqhdkulg"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "blake2b", "/tmp/njttgoqaiz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "blake2b", "/tmp/njttgoqaiz"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "blake2b", "/tmp/njttgoqaiz"] Step #5: Rust stderr: Step #5: /tmp/njttgoqaiz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/njttgoqaiz: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "blake2b", "/tmp/njttgoqaiz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "crc", "--untagged", "-c", "-a", "sysv", "/tmp/xxlqnhsbnm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "crc", "--untagged", "-c", "-a", "sysv", "/tmp/xxlqnhsbnm"] Step #5: === Compare result for: cksum ["-a", "crc", "--untagged", "-c", "-a", "sysv", "/tmp/xxlqnhsbnm"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "crc", "--untagged", "-c", "-a", "sysv", "/tmp/xxlqnhsbnm"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "bsd", "-c", "/tmp/sacfgfpgjv", "-a", "md5", "/tmp/aeatvwabyr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "bsd", "-c", "/tmp/sacfgfpgjv", "-a", "md5", "/tmp/aeatvwabyr"] Step #5: === Compare result for: cksum ["-a", "bsd", "-c", "/tmp/sacfgfpgjv", "-a", "md5", "/tmp/aeatvwabyr"] Step #5: Rust stderr: Step #5: /tmp/sacfgfpgjv: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/aeatvwabyr: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/sacfgfpgjv: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/aeatvwabyr: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "bsd", "-c", "/tmp/sacfgfpgjv", "-a", "md5", "/tmp/aeatvwabyr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/vvlcmulrdo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/vvlcmulrdo"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/vvlcmulrdo"] Step #5: Rust stderr: Step #5: /tmp/vvlcmulrdo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/vvlcmulrdo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/vvlcmulrdo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/npimgbeskc"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/npimgbeskc"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/npimgbeskc"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/npimgbeskc"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "441", "-c", "-a", "md5", "/tmp/vblkgyjfve"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "441", "-c", "-a", "md5", "/tmp/vblkgyjfve"] Step #5: === Compare result for: cksum ["-l", "441", "-c", "-a", "md5", "/tmp/vblkgyjfve"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "441", "-c", "-a", "md5", "/tmp/vblkgyjfve"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/fsoamrgfwy"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/fsoamrgfwy"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/fsoamrgfwy"] Step #5: Rust stderr: Step #5: /tmp/fsoamrgfwy: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/fsoamrgfwy: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/fsoamrgfwy"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha512", "/tmp/hakkmubvke"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha512", "/tmp/hakkmubvke"] Step #5: === Compare result for: cksum ["-c", "-a", "sha512", "/tmp/hakkmubvke"] Step #5: Rust stderr: Step #5: /tmp/hakkmubvke: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hakkmubvke: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha512", "/tmp/hakkmubvke"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/wprmratnbz", "-a", "sha512", "/tmp/pxlhlaexng"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/wprmratnbz", "-a", "sha512", "/tmp/pxlhlaexng"] Step #5: === Compare result for: cksum ["-c", "/tmp/wprmratnbz", "-a", "sha512", "/tmp/pxlhlaexng"] Step #5: Rust stderr: Step #5: /tmp/wprmratnbz: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/pxlhlaexng: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wprmratnbz: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/pxlhlaexng: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/wprmratnbz", "-a", "sha512", "/tmp/pxlhlaexng"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/kyusmhjweh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/kyusmhjweh"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/kyusmhjweh"] Step #5: Rust stderr: Step #5: /tmp/kyusmhjweh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kyusmhjweh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/kyusmhjweh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/cweycgwxir"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/cweycgwxir"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/cweycgwxir"] Step #5: Rust stderr: Step #5: /tmp/cweycgwxir: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cweycgwxir: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/cweycgwxir"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/yudddztfuo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/yudddztfuo"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/yudddztfuo"] Step #5: Rust stderr: Step #5: /tmp/yudddztfuo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/yudddztfuo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/yudddztfuo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/eduwycabmh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/eduwycabmh"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/eduwycabmh"] Step #5: Rust stderr: Step #5: /tmp/eduwycabmh: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/eduwycabmh: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/eduwycabmh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/vanykepuwl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/vanykepuwl"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/vanykepuwl"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/vanykepuwl"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/xrdpojxjef", "-a", "sha224", "/tmp/arwpmjkngq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/xrdpojxjef", "-a", "sha224", "/tmp/arwpmjkngq"] Step #5: === Compare result for: cksum ["-c", "/tmp/xrdpojxjef", "-a", "sha224", "/tmp/arwpmjkngq"] Step #5: Rust stderr: Step #5: /tmp/xrdpojxjef: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/arwpmjkngq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/xrdpojxjef: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/arwpmjkngq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/xrdpojxjef", "-a", "sha224", "/tmp/arwpmjkngq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/omcahszmbz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/omcahszmbz"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/omcahszmbz"] Step #5: Rust stderr: Step #5: /tmp/omcahszmbz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/omcahszmbz: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/omcahszmbz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/cognelgzcg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/cognelgzcg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/cognelgzcg"] Step #5: Rust stderr: Step #5: /tmp/cognelgzcg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cognelgzcg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/cognelgzcg"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "--tag", "-c", "-a", "sm3", "/tmp/pcidjfoneq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "--tag", "-c", "-a", "sm3", "/tmp/pcidjfoneq"] Step #5: === Compare result for: cksum ["-a", "md5", "--tag", "-c", "-a", "sm3", "/tmp/pcidjfoneq"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "--tag", "-c", "-a", "sm3", "/tmp/pcidjfoneq"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-l", "154", "-c", "-a", "sha512", "/tmp/ixaemzwpwp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-l", "154", "-c", "-a", "sha512", "/tmp/ixaemzwpwp"] Step #5: === Compare result for: cksum ["-a", "sha512", "-l", "154", "-c", "-a", "sha512", "/tmp/ixaemzwpwp"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-l", "154", "-c", "-a", "sha512", "/tmp/ixaemzwpwp"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha1", "-c", "-a", "bsd", "/tmp/zuberttfnm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha1", "-c", "-a", "bsd", "/tmp/zuberttfnm"] Step #5: === Compare result for: cksum ["-a", "sha1", "-c", "-a", "bsd", "/tmp/zuberttfnm"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha1", "-c", "-a", "bsd", "/tmp/zuberttfnm"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha384", "-c", "/tmp/ezcsnkgmvk", "-a", "sha1", "/tmp/hifmpjptnw"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha384", "-c", "/tmp/ezcsnkgmvk", "-a", "sha1", "/tmp/hifmpjptnw"] Step #5: === Compare result for: cksum ["-a", "sha384", "-c", "/tmp/ezcsnkgmvk", "-a", "sha1", "/tmp/hifmpjptnw"] Step #5: Rust stderr: Step #5: /tmp/ezcsnkgmvk: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/hifmpjptnw: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ezcsnkgmvk: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/hifmpjptnw: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha384", "-c", "/tmp/ezcsnkgmvk", "-a", "sha1", "/tmp/hifmpjptnw"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-l", "107", "-c", "-a", "sha256", "/tmp/zevbvzaavr"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-l", "107", "-c", "-a", "sha256", "/tmp/zevbvzaavr"] Step #5: === Compare result for: cksum ["-a", "sysv", "-l", "107", "-c", "-a", "sha256", "/tmp/zevbvzaavr"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-l", "107", "-c", "-a", "sha256", "/tmp/zevbvzaavr"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha384", "/tmp/isedtymdcg"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha384", "/tmp/isedtymdcg"] Step #5: === Compare result for: cksum ["-c", "-a", "sha384", "/tmp/isedtymdcg"] Step #5: Rust stderr: Step #5: /tmp/isedtymdcg: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/isedtymdcg: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha384", "/tmp/isedtymdcg"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "crc", "/tmp/fjbywcgqbk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "crc", "/tmp/fjbywcgqbk"] Step #5: === Compare result for: cksum ["-c", "-a", "crc", "/tmp/fjbywcgqbk"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "crc", "/tmp/fjbywcgqbk"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/wkhmxlsspb"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/wkhmxlsspb"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/wkhmxlsspb"] Step #5: Rust stderr: Step #5: /tmp/wkhmxlsspb: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/wkhmxlsspb: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/wkhmxlsspb"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha224", "/tmp/rtxaasgiil"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha224", "/tmp/rtxaasgiil"] Step #5: === Compare result for: cksum ["-c", "-a", "sha224", "/tmp/rtxaasgiil"] Step #5: Rust stderr: Step #5: /tmp/rtxaasgiil: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rtxaasgiil: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha224", "/tmp/rtxaasgiil"] Step #5: Step #5: === TEST cksum ["cksum", "file_9"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_9"] Step #5: === Compare result for: cksum ["file_9"] Step #5: === OK Same behavior Step #5: Step #5: === TEST cksum ["cksum", "--raw", "-c", "/tmp/cklergoggs", "-a", "blake2b", "/tmp/hgzfdgtwpp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--raw", "-c", "/tmp/cklergoggs", "-a", "blake2b", "/tmp/hgzfdgtwpp"] Step #5: === Compare result for: cksum ["--raw", "-c", "/tmp/cklergoggs", "-a", "blake2b", "/tmp/hgzfdgtwpp"] Step #5: Rust stderr: Step #5: /tmp/cklergoggs: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/hgzfdgtwpp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--raw' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/cklergoggs: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/hgzfdgtwpp: no properly formatted checksum lines found Step #5: +unrecognized option '--raw' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--raw", "-c", "/tmp/cklergoggs", "-a", "blake2b", "/tmp/hgzfdgtwpp"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "--base64", "-c", "/tmp/ywotbujahp", "-a", "sha384", "/tmp/atlwphuulo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "--base64", "-c", "/tmp/ywotbujahp", "-a", "sha384", "/tmp/atlwphuulo"] Step #5: === Compare result for: cksum ["-a", "md5", "--base64", "-c", "/tmp/ywotbujahp", "-a", "sha384", "/tmp/atlwphuulo"] Step #5: Rust stderr: Step #5: /tmp/ywotbujahp: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/atlwphuulo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ywotbujahp: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/atlwphuulo: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "--base64", "-c", "/tmp/ywotbujahp", "-a", "sha384", "/tmp/atlwphuulo"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/saimhszwil", "-a", "bsd", "/tmp/lqitxfingh"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/saimhszwil", "-a", "bsd", "/tmp/lqitxfingh"] Step #5: === Compare result for: cksum ["-c", "/tmp/saimhszwil", "-a", "bsd", "/tmp/lqitxfingh"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/saimhszwil", "-a", "bsd", "/tmp/lqitxfingh"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/etslvsixqx"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/etslvsixqx"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/etslvsixqx"] Step #5: Rust stderr: Step #5: /tmp/etslvsixqx: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/etslvsixqx: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/etslvsixqx"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "sha256", "/tmp/zbavgomaqe"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "sha256", "/tmp/zbavgomaqe"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "sha256", "/tmp/zbavgomaqe"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "sha256", "/tmp/zbavgomaqe"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/dxcdjkbczg", "-a", "sha1", "/tmp/eiirxxgyte"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/dxcdjkbczg", "-a", "sha1", "/tmp/eiirxxgyte"] Step #5: === Compare result for: cksum ["-c", "/tmp/dxcdjkbczg", "-a", "sha1", "/tmp/eiirxxgyte"] Step #5: Rust stderr: Step #5: /tmp/dxcdjkbczg: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/eiirxxgyte: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dxcdjkbczg: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/eiirxxgyte: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/dxcdjkbczg", "-a", "sha1", "/tmp/eiirxxgyte"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "-a", "bsd", "/tmp/cakuskwczn"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "-a", "bsd", "/tmp/cakuskwczn"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "-a", "bsd", "/tmp/cakuskwczn"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "-a", "bsd", "/tmp/cakuskwczn"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/kvnhpdnesc", "-a", "sha384", "/tmp/ayolzavdky"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/kvnhpdnesc", "-a", "sha384", "/tmp/ayolzavdky"] Step #5: === Compare result for: cksum ["-c", "/tmp/kvnhpdnesc", "-a", "sha384", "/tmp/ayolzavdky"] Step #5: Rust stderr: Step #5: /tmp/kvnhpdnesc: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/ayolzavdky: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/kvnhpdnesc: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/ayolzavdky: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/kvnhpdnesc", "-a", "sha384", "/tmp/ayolzavdky"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/oskfjfcmdv", "-a", "md5", "/tmp/mxdjrmapay"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/oskfjfcmdv", "-a", "md5", "/tmp/mxdjrmapay"] Step #5: === Compare result for: cksum ["-c", "/tmp/oskfjfcmdv", "-a", "md5", "/tmp/mxdjrmapay"] Step #5: Rust stderr: Step #5: /tmp/oskfjfcmdv: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/mxdjrmapay: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/oskfjfcmdv: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/mxdjrmapay: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/oskfjfcmdv", "-a", "md5", "/tmp/mxdjrmapay"] Step #5: Step #5: === TEST cksum ["cksum", "-l", "131", "-c", "-a", "crc", "/tmp/asoeebxqcd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-l", "131", "-c", "-a", "crc", "/tmp/asoeebxqcd"] Step #5: === Compare result for: cksum ["-l", "131", "-c", "-a", "crc", "/tmp/asoeebxqcd"] Step #5: Rust stderr: Step #5: --length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: GNU stderr: Step #5: invalid option -- 'l' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---length is only supported with --algorithm blake2b, sha2, or sha3 Step #5: +invalid option -- 'l' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-l", "131", "-c", "-a", "crc", "/tmp/asoeebxqcd"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/sqfuhtzzfu"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sysv", "/tmp/sqfuhtzzfu"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/sqfuhtzzfu"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sysv", "/tmp/sqfuhtzzfu"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sha256", "/tmp/tsrglvgqyt"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sha256", "/tmp/tsrglvgqyt"] Step #5: === Compare result for: cksum ["-c", "-a", "sha256", "/tmp/tsrglvgqyt"] Step #5: Rust stderr: Step #5: /tmp/tsrglvgqyt: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/tsrglvgqyt: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sha256", "/tmp/tsrglvgqyt"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha256", "-c", "/tmp/uwohcbiydt", "-a", "sha384", "/tmp/tsprvijatz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha256", "-c", "/tmp/uwohcbiydt", "-a", "sha384", "/tmp/tsprvijatz"] Step #5: === Compare result for: cksum ["-a", "sha256", "-c", "/tmp/uwohcbiydt", "-a", "sha384", "/tmp/tsprvijatz"] Step #5: Rust stderr: Step #5: /tmp/uwohcbiydt: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/tsprvijatz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/uwohcbiydt: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/tsprvijatz: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha256", "-c", "/tmp/uwohcbiydt", "-a", "sha384", "/tmp/tsprvijatz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/aqxxrlqckn", "-a", "sha256", "/tmp/debkiuezmq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/aqxxrlqckn", "-a", "sha256", "/tmp/debkiuezmq"] Step #5: === Compare result for: cksum ["-c", "/tmp/aqxxrlqckn", "-a", "sha256", "/tmp/debkiuezmq"] Step #5: Rust stderr: Step #5: /tmp/aqxxrlqckn: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/debkiuezmq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/aqxxrlqckn: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/debkiuezmq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/aqxxrlqckn", "-a", "sha256", "/tmp/debkiuezmq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/rzgncjlzhe", "-a", "sm3", "/tmp/bqoxjpbngo"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/rzgncjlzhe", "-a", "sm3", "/tmp/bqoxjpbngo"] Step #5: === Compare result for: cksum ["-c", "/tmp/rzgncjlzhe", "-a", "sm3", "/tmp/bqoxjpbngo"] Step #5: Rust stderr: Step #5: /tmp/rzgncjlzhe: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/bqoxjpbngo: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rzgncjlzhe: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/bqoxjpbngo: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/rzgncjlzhe", "-a", "sm3", "/tmp/bqoxjpbngo"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "sha512", "/tmp/mkmllrxdsd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "sha512", "/tmp/mkmllrxdsd"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "sha512", "/tmp/mkmllrxdsd"] Step #5: Rust stderr: Step #5: /tmp/mkmllrxdsd: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/mkmllrxdsd: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "sha512", "/tmp/mkmllrxdsd"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/dpuupocegq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/dpuupocegq"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/dpuupocegq"] Step #5: Rust stderr: Step #5: /tmp/dpuupocegq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/dpuupocegq: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/dpuupocegq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sm3", "/tmp/soercdznwp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sm3", "/tmp/soercdznwp"] Step #5: === Compare result for: cksum ["-c", "-a", "sm3", "/tmp/soercdznwp"] Step #5: Rust stderr: Step #5: /tmp/soercdznwp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/soercdznwp: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sm3", "/tmp/soercdznwp"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/psnrxlgcyz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/psnrxlgcyz"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/psnrxlgcyz"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/psnrxlgcyz"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/arawpgasks"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/arawpgasks"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/arawpgasks"] Step #5: Rust stderr: Step #5: /tmp/arawpgasks: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/arawpgasks: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/arawpgasks"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "sysv", "/tmp/qbmnztgwet"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "sysv", "/tmp/qbmnztgwet"] Step #5: === Compare result for: cksum ["-c", "-a", "sysv", "/tmp/qbmnztgwet"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "sysv", "/tmp/qbmnztgwet"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha512", "-c", "-a", "sm3", "/tmp/hzqircblwz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha512", "-c", "-a", "sm3", "/tmp/hzqircblwz"] Step #5: === Compare result for: cksum ["-a", "sha512", "-c", "-a", "sm3", "/tmp/hzqircblwz"] Step #5: Rust stderr: Step #5: /tmp/hzqircblwz: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/hzqircblwz: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha512", "-c", "-a", "sm3", "/tmp/hzqircblwz"] Step #5: Step #5: === TEST cksum ["cksum", "--text", "-c", "-a", "sysv", "/tmp/hymaqebsxq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--text", "-c", "-a", "sysv", "/tmp/hymaqebsxq"] Step #5: === Compare result for: cksum ["--text", "-c", "-a", "sysv", "/tmp/hymaqebsxq"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--text' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--text' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--text", "-c", "-a", "sysv", "/tmp/hymaqebsxq"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "/tmp/raaxnxzyzx", "-a", "sysv", "/tmp/lzbbgxptsi"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "/tmp/raaxnxzyzx", "-a", "sysv", "/tmp/lzbbgxptsi"] Step #5: === Compare result for: cksum ["-c", "/tmp/raaxnxzyzx", "-a", "sysv", "/tmp/lzbbgxptsi"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "/tmp/raaxnxzyzx", "-a", "sysv", "/tmp/lzbbgxptsi"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "-a", "crc", "/tmp/ekkvbvafgl"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "-a", "crc", "/tmp/ekkvbvafgl"] Step #5: === Compare result for: cksum ["--binary", "-c", "-a", "crc", "/tmp/ekkvbvafgl"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "-a", "crc", "/tmp/ekkvbvafgl"] Step #5: Step #5: === TEST cksum ["cksum", "file_🔩(7ni", "/tmp/dabnxolrjd"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "file_🔩(7ni", "/tmp/dabnxolrjd"] Step #5: === Compare result for: cksum ["file_🔩(7ni", "/tmp/dabnxolrjd"] Step #5: Rust stderr: Step #5: file_🔩(7ni: No such file or directory Step #5: GNU stderr: Step #5: 'file_'$'\360\237\224\251''(7ni': No such file or directory Step #5: --- START diff Step #5: -file_🔩(7ni: No such file or directory Step #5: +'file_'$'\360\237\224\251''(7ni': No such file or directory Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["file_🔩(7ni", "/tmp/dabnxolrjd"] Step #5: Step #5: === TEST cksum ["cksum", "--binary", "-c", "/tmp/lcyqomntdh", "-a", "sha224", "/tmp/tcsgcagbtz"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--binary", "-c", "/tmp/lcyqomntdh", "-a", "sha224", "/tmp/tcsgcagbtz"] Step #5: === Compare result for: cksum ["--binary", "-c", "/tmp/lcyqomntdh", "-a", "sha224", "/tmp/tcsgcagbtz"] Step #5: Rust stderr: Step #5: the --binary and --text options are meaningless when verifying checksums Step #5: GNU stderr: Step #5: unrecognized option '--binary' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -the --binary and --text options are meaningless when verifying checksums Step #5: +unrecognized option '--binary' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--binary", "-c", "/tmp/lcyqomntdh", "-a", "sha224", "/tmp/tcsgcagbtz"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "blake2b", "-c", "-a", "blake2b", "/tmp/lhkvxrstvq"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "blake2b", "-c", "-a", "blake2b", "/tmp/lhkvxrstvq"] Step #5: === Compare result for: cksum ["-a", "blake2b", "-c", "-a", "blake2b", "/tmp/lhkvxrstvq"] Step #5: Rust stderr: Step #5: /tmp/lhkvxrstvq: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/lhkvxrstvq: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "blake2b", "-c", "-a", "blake2b", "/tmp/lhkvxrstvq"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "-a", "crc", "/tmp/ntnsfgsaby"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "-a", "crc", "/tmp/ntnsfgsaby"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "-a", "crc", "/tmp/ntnsfgsaby"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "-a", "crc", "/tmp/ntnsfgsaby"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sm3", "-c", "-a", "crc", "/tmp/hllzzfsfof"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sm3", "-c", "-a", "crc", "/tmp/hllzzfsfof"] Step #5: === Compare result for: cksum ["-a", "sm3", "-c", "-a", "crc", "/tmp/hllzzfsfof"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sm3", "-c", "-a", "crc", "/tmp/hllzzfsfof"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "-a", "sha1", "/tmp/bgeqsdedrf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "-a", "sha1", "/tmp/bgeqsdedrf"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "-a", "sha1", "/tmp/bgeqsdedrf"] Step #5: Rust stderr: Step #5: /tmp/bgeqsdedrf: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/bgeqsdedrf: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "-a", "sha1", "/tmp/bgeqsdedrf"] Step #5: Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/flhborcjec"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/flhborcjec"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/flhborcjec"] Step #5: Rust stderr: Step #5: /tmp/flhborcjec: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/flhborcjec: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/flhborcjec"] Step #5: Step #5: === TEST cksum ["cksum", "--base64", "file_gÃiÃ", "/tmp/hjclxkoxrm"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "file_gÃiÃ", "/tmp/hjclxkoxrm"] Step #5: === Compare result for: cksum ["--base64", "file_gÃiÃ", "/tmp/hjclxkoxrm"] Step #5: Rust stdout: Step #5: 3727398621 937 /tmp/hjclxkoxrm Step #5: Step #5: GNU stdout: Step #5: (empty) Step #5: --- START diff Step #5: -3727398621 937 /tmp/hjclxkoxrm Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: file_gÃiÃ: No such file or directory Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -file_gÃiÃ: No such file or directory Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: cksum ["--base64", "file_gÃiÃ", "/tmp/hjclxkoxrm"] Step #5: Step #5: thread '' (7913) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: cksum ["--base64", "file_gÃiÃ", "/tmp/hjclxkoxrm"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7913== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x66,0x6f,0x72,0x28,0x9,0x76,0x61,0x72,0xa,0x9,0x79,0xd,0xa,0x69,0x6e,0x60,0x4e,0xa,0x9,0xa,0x66,0xa,0xa,0xa,0xa,0x3c,0x3c,0xa,0x79,0xa,0x2f,0x2f,0xff,0x49,0x2e,0x2e,0xa,0x6c,0x65,0x74,0xa,0xa,0xa,0xa,0xa,0xa,0x66,0xf6,0x94,0xa,0x60,0x2f,0x2f,0x0,0x4,0x0,0x1,0x30,0x0,0x3d,0x40,0x43,0x2c,0x8,0xa3,0xa3,0x31,0x26,0x37,0x38,0xdf,0x7f,0x30,0x26,0x21,0x16,0x7f,0x30,0x26,0x21,0x16,0x34,0xff,0xa,0x29,0xa,0xa,0xa,0x9,0x74,0x72,0x79,0x7b,0x35,0x26,0x2d,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0x4a,0x53,0x4f,0x4e,0xa,0x9,0xa,0x66,0xa,0xa,0xa,0xa,0x3c,0x3c,0xa,0x79,0xa,0x2f,0x2f,0xff,0x49,0x2e,0x2e,0xa,0x6c,0x65,0x74,0xa,0xa,0xa,0xa,0xa,0xa,0x66,0x9,0x2f,0x2f,0xff,0x1a,0x64,0x2,0x6a,0xbd,0x70,0x2f,0xcb,0x20,0x24,0x79,0xa,0x7d,0x20,0x9,0x63,0x61,0x74,0x63,0x68,0x28,0xa,0x6f,0x64,0x39,0x6a,0x72,0x65,0x64,0x66,0x6d,0x73,0x29,0x7b,0x7d,0xa, Step #5: for(\011var\012\011y\015\012in`N\012\011\012f\012\012\012\012<<\012y\012//\377I..\012let\012\012\012\012\012\012f\366\224\012`//\000\004\000\0010\000=@C,\010\243\2431&78\337\1770&!\026\1770&!\0264\377\012)\012\012\012\011try{5&-\012\012\012\012\012\012\012\012JSON\012\011\012f\012\012\012\012<<\012y\012//\377I..\012let\012\012\012\012\012\012f\011//\377\032d\002j\275p/\313 $y\012} \011catch(\012od9jredfms){}\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-510ea96ad19b1962039c1daa20b67a4aae08c41e Step #5: Base64: Zm9yKAl2YXIKCXkNCmluYE4KCQpmCgoKCjw8CnkKLy//SS4uCmxldAoKCgoKCmb2lApgLy8ABAABMAA9QEMsCKOjMSY3ON9/MCYhFn8wJiEWNP8KKQoKCgl0cnl7NSYtCgoKCgoKCgpKU09OCgkKZgoKCgo8PAp5Ci8v/0kuLgpsZXQKCgoKCgpmCS8v/xpkAmq9cC/LICR5Cn0gCWNhdGNoKApvZDlqcmVkZm1zKXt9Cg== Step #5: MERGE-OUTER: attempt 13 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766480681 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge452.txt' Step #5: MERGE-INNER: '/corpus/fuzz_cksum/510ea96ad19b1962039c1daa20b67a4aae08c41e' caused a failure at the previous merge step Step #5: MERGE-INNER: 424 total files; 418 processed earlier; will process 6 files now Step #5: === TEST cksum ["cksum", "--base64", "-c", "-a", "sha384", "/tmp/rteryijiub"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--base64", "-c", "-a", "sha384", "/tmp/rteryijiub"] Step #5: === Compare result for: cksum ["--base64", "-c", "-a", "sha384", "/tmp/rteryijiub"] Step #5: Rust stderr: Step #5: /tmp/rteryijiub: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: unrecognized option '--base64' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/rteryijiub: no properly formatted checksum lines found Step #5: +unrecognized option '--base64' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--base64", "-c", "-a", "sha384", "/tmp/rteryijiub"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sha224", "-c", "/tmp/ecslyewxbx", "-a", "sm3", "/tmp/odnmeukwmp"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sha224", "-c", "/tmp/ecslyewxbx", "-a", "sm3", "/tmp/odnmeukwmp"] Step #5: === Compare result for: cksum ["-a", "sha224", "-c", "/tmp/ecslyewxbx", "-a", "sm3", "/tmp/odnmeukwmp"] Step #5: Rust stderr: Step #5: /tmp/ecslyewxbx: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/odnmeukwmp: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/ecslyewxbx: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/odnmeukwmp: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sha224", "-c", "/tmp/ecslyewxbx", "-a", "sm3", "/tmp/odnmeukwmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-c", "-a", "md5", "/tmp/izjasdjkpk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-c", "-a", "md5", "/tmp/izjasdjkpk"] Step #5: === Compare result for: cksum ["-c", "-a", "md5", "/tmp/izjasdjkpk"] Step #5: Rust stderr: Step #5: /tmp/izjasdjkpk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'c' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/izjasdjkpk: no properly formatted checksum lines found Step #5: +invalid option -- 'c' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-c", "-a", "md5", "/tmp/izjasdjkpk"] Step #5: Step #5: === TEST cksum ["cksum", "--tag", "-c", "-a", "crc", "/tmp/egpjiyaqot"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "--tag", "-c", "-a", "crc", "/tmp/egpjiyaqot"] Step #5: === Compare result for: cksum ["--tag", "-c", "-a", "crc", "/tmp/egpjiyaqot"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: unrecognized option '--tag' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +unrecognized option '--tag' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["--tag", "-c", "-a", "crc", "/tmp/egpjiyaqot"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: === TEST cksum ["cksum", "-a", "sysv", "-c", "/tmp/dpzeupsbyd", "-a", "bsd", "/tmp/syemosrqpf"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "sysv", "-c", "/tmp/dpzeupsbyd", "-a", "bsd", "/tmp/syemosrqpf"] Step #5: === Compare result for: cksum ["-a", "sysv", "-c", "/tmp/dpzeupsbyd", "-a", "bsd", "/tmp/syemosrqpf"] Step #5: Rust stderr: Step #5: --check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: ---check is not supported with --algorithm={bsd,sysv,crc,crc32b} Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "sysv", "-c", "/tmp/dpzeupsbyd", "-a", "bsd", "/tmp/syemosrqpf"] Step #5: Step #5: === TEST cksum ["cksum", "-a", "md5", "-c", "/tmp/qmizldimuf", "-a", "blake2b", "/tmp/wssvaktahk"] Step #5: File content (/tmp/checksum_file) Step #5: (empty) Step #5: Running test ["cksum", "-a", "md5", "-c", "/tmp/qmizldimuf", "-a", "blake2b", "/tmp/wssvaktahk"] Step #5: === Compare result for: cksum ["-a", "md5", "-c", "/tmp/qmizldimuf", "-a", "blake2b", "/tmp/wssvaktahk"] Step #5: Rust stderr: Step #5: /tmp/qmizldimuf: no properly formatted checksum lines found Step #5: fuzz_cksum: /tmp/wssvaktahk: no properly formatted checksum lines found Step #5: GNU stderr: Step #5: invalid option -- 'a' Step #5: Try 'cksum --help' for more information. Step #5: --- START diff Step #5: -/tmp/qmizldimuf: no properly formatted checksum lines found Step #5: -fuzz_cksum: /tmp/wssvaktahk: no properly formatted checksum lines found Step #5: +invalid option -- 'a' Step #5: +Try 'cksum --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: cksum ["-a", "md5", "-c", "/tmp/qmizldimuf", "-a", "blake2b", "/tmp/wssvaktahk"] Step #5: Step #5: #6 DONE exec/s: 0 rss: 29Mb Step #5: MERGE-OUTER: successful in 13 attempt(s) Step #5: MERGE-OUTER: the control file has 37334 bytes Step #5: MERGE-OUTER: consumed 0Mb (27Mb rss) to parse the control file Step #5: MERGE-OUTER: 0 new files with 0 new features added; 0 new coverage edges Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_seq_error.log Step #5: [2025-11-03 06:53:53,764 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:53,772 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_sort_error.log Step #5: Error occured while running fuzz_env: Step #5: Cov returncode: 0, grep returncode: 0 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765025914 Step #5: MERGE-OUTER: 302 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765034306 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: 302 total files; 0 processed earlier; will process 302 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-u=zl", "LÃ7=KQ"] Step #5: === Compare result for: env ["-i", "-u=zl", "LÃ7=KQ"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LÃ7=KQ Step #5: Step #5: --- START diff Step #5: +LÃ7=KQ Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=zl", "LÃ7=KQ"] Step #5: Step #5: thread '' (1323) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=zl", "LÃ7=KQ"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1323== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa2, Step #5: \242 Step #5: artifact_prefix='./'; Test unit written to ./crash-10687feb9716c9502d9a40fdfe3bb339055c8651 Step #5: Base64: og== Step #5: MERGE-OUTER: attempt 2 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765047137 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/10687feb9716c9502d9a40fdfe3bb339055c8651' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 2 processed earlier; will process 300 files now Step #5: Running test ["env", "-0", "Ã6Ã=KÃt9"] Step #5: === Compare result for: env ["-0", "Ã6Ã=KÃt9"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workÃ6Ã=KÃt9 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEÃ6Ã=KÃt9 Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workÃ6Ã=KÃt9 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEÃ6Ã=KÃt9 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "Ã6Ã=KÃt9"] Step #5: Step #5: thread '' (1399) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "Ã6Ã=KÃt9"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1399== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x99, Step #5: \231 Step #5: artifact_prefix='./'; Test unit written to ./crash-b25b0fbf46cef1d888fe900445c9ab95330f44cd Step #5: Base64: mQ== Step #5: MERGE-OUTER: attempt 3 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765057216 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b25b0fbf46cef1d888fe900445c9ab95330f44cd' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 3 processed earlier; will process 299 files now Step #5: Running test ["env", "V(u=jI(Nn", "A(H=vVu"] Step #5: === Compare result for: env ["V(u=jI(Nn", "A(H=vVu"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: V(u=jI(Nn Step #5: A(H=vVu Step #5: Step #5: GNU stdout: Step #5: A(H=vVu Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: V(u=jI(Nn Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +A(H=vVu Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: -WORK=/work Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: V(u=jI(Nn Step #5: -A(H=vVu Step #5: +WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["V(u=jI(Nn", "A(H=vVu"] Step #5: Step #5: thread '' (1455) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["V(u=jI(Nn", "A(H=vVu"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1455== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x20, Step #5: Step #5: artifact_prefix='./'; Test unit written to ./crash-b858cb282617fb0956d960215c8e84d1ccf909c6 Step #5: Base64: IA== Step #5: MERGE-OUTER: attempt 4 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765068273 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/regressions/b858cb282617fb0956d960215c8e84d1ccf909c6' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 4 processed earlier; will process 298 files now Step #5: Running test ["env", "-vv", "aNSM=🪛"] Step #5: === Compare result for: env ["-vv", "aNSM=🪛"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: aNSM=🪛 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aNSM=🪛 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aNSM=🪛 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'aNSM=🪛' Step #5: GNU stderr: Step #5: aNSM=🪛 Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'aNSM=🪛' Step #5: +aNSM=🪛 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "aNSM=🪛"] Step #5: Step #5: thread '' (1519) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "aNSM=🪛"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1519== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa1, Step #5: \241 Step #5: artifact_prefix='./'; Test unit written to ./crash-eb6b0e7165a8118b4bd2de93fbe8182dc50fe8de Step #5: Base64: oQ== Step #5: MERGE-OUTER: attempt 5 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765078963 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/eb6b0e7165a8118b4bd2de93fbe8182dc50fe8de' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 5 processed earlier; will process 297 files now Step #5: Running test ["env", "-v", "-u="] Step #5: === Compare result for: env ["-v", "-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "-u=7z(🔩DzSW", "1u="] Step #5: === Compare result for: env ["-v", "-u=7z(🔩DzSW", "1u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =7z(🔩DzSW Step #5: env: cannot unset '=7z(\360\237\224\251DzSW': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=7z(🔩DzSW Step #5: +env: cannot unset '=7z(\360\237\224\251DzSW': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=7z(🔩DzSW", "1u="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (1586) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1586== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x45, Step #5: E Step #5: artifact_prefix='./'; Test unit written to ./crash-e0184adedf913b076626646d3f52c3b49c39ad6d Step #5: Base64: RQ== Step #5: MERGE-OUTER: attempt 6 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765092116 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e0184adedf913b076626646d3f52c3b49c39ad6d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 8 processed earlier; will process 294 files now Step #5: Running test ["env", "🔗p=aoGe", "Jk=G🔗"] Step #5: === Compare result for: env ["🔗p=aoGe", "Jk=G🔗"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 🔗p=aoGe Step #5: Jk=G🔗 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: Jk=G🔗 Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🔗p=aoGe Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +Jk=G🔗 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🔗p=aoGe Step #5: -Jk=G🔗 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["🔗p=aoGe", "Jk=G🔗"] Step #5: Step #5: thread '' (1681) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["🔗p=aoGe", "Jk=G🔗"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1681== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x75, Step #5: u Step #5: artifact_prefix='./'; Test unit written to ./crash-51e69892ab49df85c6230ccc57f8e1d1606caccc Step #5: Base64: dQ== Step #5: MERGE-OUTER: attempt 7 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765102399 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/51e69892ab49df85c6230ccc57f8e1d1606caccc' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 9 processed earlier; will process 293 files now Step #5: Running test ["env", "O=mhFHQ", "(hA="] Step #5: === Compare result for: env ["O=mhFHQ", "(hA="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: O=mhFHQ Step #5: (hA= Step #5: Step #5: GNU stdout: Step #5: (hA= Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: O=mhFHQ Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(hA= Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +O=mhFHQ Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -O=mhFHQ Step #5: -(hA= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["O=mhFHQ", "(hA="] Step #5: Step #5: thread '' (1762) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["O=mhFHQ", "(hA="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1762== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3f, Step #5: ? Step #5: artifact_prefix='./'; Test unit written to ./crash-5bab61eb53176449e25c2c82f172b82cb13ffb9d Step #5: Base64: Pw== Step #5: MERGE-OUTER: attempt 8 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765114159 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5bab61eb53176449e25c2c82f172b82cb13ffb9d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 10 processed earlier; will process 292 files now Step #5: Running test ["env", "-v", "--chdir=/tmp", "t3Ã8=i"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "t3Ã8=i"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: t3Ã8=i Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +t3Ã8=i Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "t3Ã8=i"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-0", "-v", "=🔩J", "30r=E(Ãz4"] Step #5: === Compare result for: env ["-i", "-0", "-v", "=🔩J", "30r=E(Ãz4"] Step #5: Rust stdout: Step #5: 30r=E(Ãz4 Step #5: GNU stdout: Step #5: =🔩J30r=E(Ãz4 Step #5: --- START diff Step #5: -30r=E(Ãz4 Step #5: +=🔩J30r=E(Ãz4 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =🔩J Step #5: setenv: 30r=E(Ãz4 Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=🔩J Step #5: +setenv: 30r=E(Ãz4 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "-0", "-v", "=🔩J", "30r=E(Ãz4"] Step #5: Step #5: thread '' (1844) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-0", "-v", "=🔩J", "30r=E(Ãz4"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1844== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf4, Step #5: \364 Step #5: artifact_prefix='./'; Test unit written to ./crash-b48f491783e98de10682f2d4455dfce5bdc3c233 Step #5: Base64: 9A== Step #5: MERGE-OUTER: attempt 9 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765125801 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b48f491783e98de10682f2d4455dfce5bdc3c233' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 12 processed earlier; will process 290 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (1932) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1932== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x41, Step #5: A Step #5: artifact_prefix='./'; Test unit written to ./crash-6dcd4ce23d88e2ee9568ba546c007c63d9131c1b Step #5: Base64: QQ== Step #5: MERGE-OUTER: attempt 10 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765135521 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/6dcd4ce23d88e2ee9568ba546c007c63d9131c1b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 13 processed earlier; will process 289 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (1991) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==1991== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6f, Step #5: o Step #5: artifact_prefix='./'; Test unit written to ./crash-7a81af3e591ac713f81ea1efe93dcf36157d8376 Step #5: Base64: bw== Step #5: MERGE-OUTER: attempt 11 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765145644 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7a81af3e591ac713f81ea1efe93dcf36157d8376' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 14 processed earlier; will process 288 files now Step #5: Running test ["env", "O8MQ=ZW", "(eL=4F"] Step #5: === Compare result for: env ["O8MQ=ZW", "(eL=4F"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: O8MQ=ZW Step #5: (eL=4F Step #5: Step #5: GNU stdout: Step #5: (eL=4F Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: O8MQ=ZW Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(eL=4F Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +O8MQ=ZW Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -O8MQ=ZW Step #5: -(eL=4F Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["O8MQ=ZW", "(eL=4F"] Step #5: Step #5: thread '' (2053) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["O8MQ=ZW", "(eL=4F"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2053== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xc4, Step #5: \304 Step #5: artifact_prefix='./'; Test unit written to ./crash-ebcdcb7effcc3f06e0d503638ac621de877fc554 Step #5: Base64: xA== Step #5: MERGE-OUTER: attempt 12 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765158743 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ebcdcb7effcc3f06e0d503638ac621de877fc554' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 15 processed earlier; will process 287 files now Step #5: Running test ["env", "="] Step #5: === Compare result for: env ["="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: = Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["="] Step #5: Step #5: thread '' (2136) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2136== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7a, Step #5: z Step #5: artifact_prefix='./'; Test unit written to ./crash-395df8f7c51f007019cb30201c49e884b46b92fa Step #5: Base64: eg== Step #5: MERGE-OUTER: attempt 13 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765171671 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/395df8f7c51f007019cb30201c49e884b46b92fa' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 16 processed earlier; will process 286 files now Step #5: Running test ["env", "9=", "=🧰9d"] Step #5: === Compare result for: env ["9=", "=🧰9d"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 9= Step #5: Step #5: GNU stdout: Step #5: 9= Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =🧰9d Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +9= Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -9= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=🧰9d Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["9=", "=🧰9d"] Step #5: Step #5: thread '' (2230) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["9=", "=🧰9d"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2230== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x1d, Step #5: \035 Step #5: artifact_prefix='./'; Test unit written to ./crash-5983ad8f6bfea1deda79409c844f51379c52be2d Step #5: Base64: HQ== Step #5: MERGE-OUTER: attempt 14 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765182689 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5983ad8f6bfea1deda79409c844f51379c52be2d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 17 processed earlier; will process 285 files now Step #5: Running test ["env", "-vv", "-u=0⚙zd", "--chdir=/tmp", "O3r(=V(", "v=P"] Step #5: === Compare result for: env ["-vv", "-u=0⚙zd", "--chdir=/tmp", "O3r(=V(", "v=P"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =0⚙zd Step #5: env: cannot unset '=0\342\232\231zd': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=0⚙zd Step #5: +env: cannot unset '=0\342\232\231zd': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=0⚙zd", "--chdir=/tmp", "O3r(=V(", "v=P"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-u=wÃ", "=gonj"] Step #5: === Compare result for: env ["-i", "-u=wÃ", "=gonj"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: =gonj Step #5: Step #5: --- START diff Step #5: +=gonj Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=wÃ", "=gonj"] Step #5: Step #5: thread '' (2313) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=wÃ", "=gonj"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2313== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x1f, Step #5: \037 Step #5: artifact_prefix='./'; Test unit written to ./crash-953efe8f531a5a87f6d2d5a65b78b05e55599abc Step #5: Base64: Hw== Step #5: MERGE-OUTER: attempt 15 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765195110 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/953efe8f531a5a87f6d2d5a65b78b05e55599abc' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 19 processed earlier; will process 283 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "--chdir=/tmp", "⚙umc=Ã4", "🔗VLh=JU1Ro"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "⚙umc=Ã4", "🔗VLh=JU1Ro"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "⚙umc=Ã4", "🔗VLh=JU1Ro"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "JFDEg=", "nC=zY⚙0"] Step #5: === Compare result for: env ["-v", "JFDEg=", "nC=zY⚙0"] Step #5: Rust stdout: Step #5: JFDEg= Step #5: nC=zY⚙0 Step #5: Step #5: GNU stdout: Step #5: JFDEg= Step #5: LC_ALL=C Step #5: nC=zY⚙0 Step #5: Step #5: --- START diff Step #5: JFDEg= Step #5: +LC_ALL=C Step #5: nC=zY⚙0 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: JFDEg= Step #5: setenv: nC=zY⚙0 Step #5: --- START diff Step #5: +JFDEg= Step #5: +setenv: nC=zY⚙0 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "JFDEg=", "nC=zY⚙0"] Step #5: Step #5: thread '' (2406) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "JFDEg=", "nC=zY⚙0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2406== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x50, Step #5: P Step #5: artifact_prefix='./'; Test unit written to ./crash-511993d3c99719e38a6779073019dacd7178ddb9 Step #5: Base64: UA== Step #5: MERGE-OUTER: attempt 16 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765210190 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/511993d3c99719e38a6779073019dacd7178ddb9' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 22 processed earlier; will process 280 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "--chdir=/tmp", "egj=", "q=K(xf"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "egj=", "q=K(xf"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: egj= Step #5: setenv: q=K(xf Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +egj= Step #5: +setenv: q=K(xf Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "egj=", "q=K(xf"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (2546) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2546== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xbd, Step #5: \275 Step #5: artifact_prefix='./'; Test unit written to ./crash-9034aaf45143996a2b14465c352ab0c6fa26b221 Step #5: Base64: vQ== Step #5: MERGE-OUTER: attempt 17 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765223444 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/9034aaf45143996a2b14465c352ab0c6fa26b221' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 25 processed earlier; will process 277 files now Step #5: Running test ["env", "-0", "5=u"] Step #5: === Compare result for: env ["-0", "5=u"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work5=u Step #5: GNU stdout: Step #5: 5=uAFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work5=u Step #5: +5=uAFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "5=u"] Step #5: Step #5: thread '' (2688) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "5=u"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2688== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x12, Step #5: \022 Step #5: artifact_prefix='./'; Test unit written to ./crash-c4f87a6290aee1acfc1f26083974ce94621fca64 Step #5: Base64: Eg== Step #5: MERGE-OUTER: attempt 18 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765234605 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c4f87a6290aee1acfc1f26083974ce94621fca64' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 26 processed earlier; will process 276 files now Step #5: Running test ["env", "-0", "fc=bPOhA", "=tsp"] Step #5: === Compare result for: env ["-0", "fc=bPOhA", "=tsp"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workfc=bPOhA Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEfc=bPOhA=tsp Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workfc=bPOhA Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEfc=bPOhA=tsp Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "fc=bPOhA", "=tsp"] Step #5: Step #5: thread '' (2785) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "fc=bPOhA", "=tsp"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2785== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xab, Step #5: \253 Step #5: artifact_prefix='./'; Test unit written to ./crash-fe83f217d464f6fdfa5b2b1f87fe3a1a47371196 Step #5: Base64: qw== Step #5: MERGE-OUTER: attempt 19 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765244852 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/fe83f217d464f6fdfa5b2b1f87fe3a1a47371196' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 27 processed earlier; will process 275 files now Step #5: Running test ["env", "-u=dVe\u{fe0f}", "--chdir=/tmp", "(v=4U", "flzfw=L"] Step #5: === Compare result for: env ["-u=dVe\u{fe0f}", "--chdir=/tmp", "(v=4U", "flzfw=L"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=dVe\357\270\217': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=dVe\357\270\217': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=dVe\u{fe0f}", "--chdir=/tmp", "(v=4U", "flzfw=L"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv", "--chdir=/tmp"] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-u=4B(317", "=fjS", "=PcI("] Step #5: === Compare result for: env ["-i", "-u=4B(317", "=fjS", "=PcI("] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: =PcI( Step #5: Step #5: --- START diff Step #5: +=PcI( Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=4B(317", "=fjS", "=PcI("] Step #5: Step #5: thread '' (2875) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=4B(317", "=fjS", "=PcI("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2875== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xe6, Step #5: \346 Step #5: artifact_prefix='./'; Test unit written to ./crash-12db8f85bfe3e0b837059fa01e53748a0727b52c Step #5: Base64: 5g== Step #5: MERGE-OUTER: attempt 20 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765259247 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/12db8f85bfe3e0b837059fa01e53748a0727b52c' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 30 processed earlier; will process 272 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-u=0s(m", "I4(dF=1dPz"] Step #5: === Compare result for: env ["-0", "-u=0s(m", "I4(dF=1dPz"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=0s(m': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=0s(m': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=0s(m", "I4(dF=1dPz"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (2984) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==2984== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x49, Step #5: I Step #5: artifact_prefix='./'; Test unit written to ./crash-ca73ab65568cd125c2d27a22bbd9e863c10b675d Step #5: Base64: SQ== Step #5: MERGE-OUTER: attempt 21 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765273531 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ca73ab65568cd125c2d27a22bbd9e863c10b675d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 33 processed earlier; will process 269 files now Step #5: Running test ["env", "-u=1C", "4(5⚙=3tsMY", "u⚙hH\u{fe0f}=ku8N5"] Step #5: === Compare result for: env ["-u=1C", "4(5⚙=3tsMY", "u⚙hH\u{fe0f}=ku8N5"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=1C': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=1C': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=1C", "4(5⚙=3tsMY", "u⚙hH\u{fe0f}=ku8N5"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "LX=🧰6k\u{fe0f}"] Step #5: === Compare result for: env ["LX=🧰6k\u{fe0f}"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: LX=🧰6k️ Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: LX=🧰6k️ Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +LX=🧰6k️ Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -LX=🧰6k️ Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["LX=🧰6k\u{fe0f}"] Step #5: Step #5: thread '' (3111) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["LX=🧰6k\u{fe0f}"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3111== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0, Step #5: \000 Step #5: artifact_prefix='./'; Test unit written to ./crash-5ba93c9db0cff93f52b521d7420e43f6eda2784f Step #5: Base64: AA== Step #5: MERGE-OUTER: attempt 22 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765287477 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5ba93c9db0cff93f52b521d7420e43f6eda2784f' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 36 processed earlier; will process 266 files now Step #5: Running test ["env", "-v", "-vv", "-u=z4", "--chdir=/tmp", "🪓="] Step #5: === Compare result for: env ["-v", "-vv", "-u=z4", "--chdir=/tmp", "🪓="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =z4 Step #5: env: cannot unset '=z4': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=z4 Step #5: +env: cannot unset '=z4': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "-u=z4", "--chdir=/tmp", "🪓="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp", "C(dM=aD", "=(🔩dDp"] Step #5: === Compare result for: env ["--chdir=/tmp", "C(dM=aD", "=(🔩dDp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "C(dM=aD", "=(🔩dDp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "=uZ", "J🔗ys=D52qq"] Step #5: === Compare result for: env ["=uZ", "J🔗ys=D52qq"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: J🔗ys=D52qq Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: J🔗ys=D52qq Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =uZ Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +J🔗ys=D52qq Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -J🔗ys=D52qq Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=uZ Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=uZ", "J🔗ys=D52qq"] Step #5: Step #5: thread '' (3214) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=uZ", "J🔗ys=D52qq"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3214== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x8a, Step #5: \212 Step #5: artifact_prefix='./'; Test unit written to ./crash-c4488af0c158e8c2832cb927cfb3ce534104cd1e Step #5: Base64: ig== Step #5: MERGE-OUTER: attempt 23 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765301496 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c4488af0c158e8c2832cb927cfb3ce534104cd1e' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 39 processed earlier; will process 263 files now Step #5: Running test ["env", "-0", "-u=", "--chdir=/tmp", "wM6=PPw"] Step #5: === Compare result for: env ["-0", "-u=", "--chdir=/tmp", "wM6=PPw"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=", "--chdir=/tmp", "wM6=PPw"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp", "Ã95b=s"] Step #5: === Compare result for: env ["--chdir=/tmp", "Ã95b=s"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "Ã95b=s"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-v", "-vv", "-u=Hil🪓", "rf(y1=1ptÃ", "flh(=s🔗🔩"] Step #5: === Compare result for: env ["-0", "-v", "-vv", "-u=Hil🪓", "rf(y1=1ptÃ", "flh(=s🔗🔩"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =Hil🪓 Step #5: env: cannot unset '=Hil\360\237\252\223': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=Hil🪓 Step #5: +env: cannot unset '=Hil\360\237\252\223': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-v", "-vv", "-u=Hil🪓", "rf(y1=1ptÃ", "flh(=s🔗🔩"] Step #5: Step #5: Running test ["env", "-vv", "4sha=2", "EA\u{fe0f}mn=Ãf(z"] Step #5: === Compare result for: env ["-vv", "4sha=2", "EA\u{fe0f}mn=Ãf(z"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 4sha=2 Step #5: EA️mn=Ãf(z Step #5: Step #5: GNU stdout: Step #5: 4sha=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: EA️mn=Ãf(z Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +4sha=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +EA️mn=Ãf(z Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -4sha=2 Step #5: -EA️mn=Ãf(z Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '4sha=2' Step #5: arg[3]: 'EA️mn=Ãf(z' Step #5: GNU stderr: Step #5: 4sha=2 Step #5: setenv: EA️mn=Ãf(z Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '4sha=2' Step #5: -arg[3]: 'EA️mn=Ãf(z' Step #5: +4sha=2 Step #5: +setenv: EA️mn=Ãf(z Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "4sha=2", "EA\u{fe0f}mn=Ãf(z"] Step #5: Step #5: thread '' (3310) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "4sha=2", "EA\u{fe0f}mn=Ãf(z"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3310== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xd1, Step #5: \321 Step #5: artifact_prefix='./'; Test unit written to ./crash-c314f8c1fa13e1afa11c8716c7bce6dbf02d09aa Step #5: Base64: 0Q== Step #5: MERGE-OUTER: attempt 24 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765317000 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c314f8c1fa13e1afa11c8716c7bce6dbf02d09aa' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 43 processed earlier; will process 259 files now Step #5: Running test ["env", "-u=AJ5A", "Ed0H=Fc("] Step #5: === Compare result for: env ["-u=AJ5A", "Ed0H=Fc("] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=AJ5A': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=AJ5A': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=AJ5A", "Ed0H=Fc("] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (3427) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3427== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x66, Step #5: f Step #5: artifact_prefix='./'; Test unit written to ./crash-4a0a19218e082a343a1b17e5333409af9d98f0f5 Step #5: Base64: Zg== Step #5: MERGE-OUTER: attempt 25 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765329764 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/4a0a19218e082a343a1b17e5333409af9d98f0f5' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 45 processed earlier; will process 257 files now Step #5: Running test ["env", "-i", "-vv", "-u=🔩uO(C⚙(3Ã", "p🪛U2⚙=W(VVg", "b=🔗🧰"] Step #5: === Compare result for: env ["-i", "-vv", "-u=🔩uO(C⚙(3Ã", "p🪛U2⚙=W(VVg", "b=🔗🧰"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: p🪛U2⚙=W(VVg Step #5: b=🔗🧰 Step #5: Step #5: --- START diff Step #5: +p🪛U2⚙=W(VVg Step #5: +b=🔗🧰 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: p🪛U2⚙=W(VVg Step #5: setenv: b=🔗🧰 Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +p🪛U2⚙=W(VVg Step #5: +setenv: b=🔗🧰 Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-vv", "-u=🔩uO(C⚙(3Ã", "p🪛U2⚙=W(VVg", "b=🔗🧰"] Step #5: Step #5: thread '' (3518) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-vv", "-u=🔩uO(C⚙(3Ã", "p🪛U2⚙=W(VVg", "b=🔗🧰"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3518== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xde, Step #5: \336 Step #5: artifact_prefix='./'; Test unit written to ./crash-a3b63037f3b6d74fc4e7156f5cdcbd902e897d1d Step #5: Base64: 3g== Step #5: MERGE-OUTER: attempt 26 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765338999 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/a3b63037f3b6d74fc4e7156f5cdcbd902e897d1d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 46 processed earlier; will process 256 files now Step #5: Running test ["env", "-v", "=C(Ã", "="] Step #5: === Compare result for: env ["-v", "=C(Ã", "="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: = Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: fuzz_env: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =C(à Step #5: setenv: = Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: -fuzz_env: warning: env-warning-no-name-specified Step #5: +=C(à Step #5: +setenv: = Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=C(Ã", "="] Step #5: Step #5: thread '' (3569) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=C(Ã", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3569== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5c, Step #5: \\ Step #5: artifact_prefix='./'; Test unit written to ./crash-08534f33c201a45017b502e90a800f1b708ebcb3 Step #5: Base64: XA== Step #5: MERGE-OUTER: attempt 27 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765348896 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/08534f33c201a45017b502e90a800f1b708ebcb3' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 47 processed earlier; will process 255 files now Step #5: Running test ["env", "NRxI4=3🪓PiC", "iG7="] Step #5: === Compare result for: env ["NRxI4=3🪓PiC", "iG7="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: NRxI4=3🪓PiC Step #5: iG7= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: NRxI4=3🪓PiC Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: iG7= Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +NRxI4=3🪓PiC Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -NRxI4=3🪓PiC Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: iG7= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["NRxI4=3🪓PiC", "iG7="] Step #5: Step #5: thread '' (3622) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["NRxI4=3🪓PiC", "iG7="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3622== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf6, Step #5: \366 Step #5: artifact_prefix='./'; Test unit written to ./crash-9b16668f4e16c0e9932661855b7bcb5bad8b0f72 Step #5: Base64: 9g== Step #5: MERGE-OUTER: attempt 28 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765360912 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/9b16668f4e16c0e9932661855b7bcb5bad8b0f72' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 48 processed earlier; will process 254 files now Step #5: Running test ["env", "-u=", "moB(H=qXiC", "=CÃTM"] Step #5: === Compare result for: env ["-u=", "moB(H=qXiC", "=CÃTM"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "moB(H=qXiC", "=CÃTM"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "8A🪓=d3"] Step #5: === Compare result for: env ["8A🪓=d3"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 8A🪓=d3 Step #5: Step #5: GNU stdout: Step #5: 8A🪓=d3 Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +8A🪓=d3 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -8A🪓=d3 Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["8A🪓=d3"] Step #5: Step #5: thread '' (3703) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["8A🪓=d3"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3703== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x4d, Step #5: M Step #5: artifact_prefix='./'; Test unit written to ./crash-c63ae6dd4fc9f9dda66970e827d13f7c73fe841c Step #5: Base64: TQ== Step #5: MERGE-OUTER: attempt 29 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765373839 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c63ae6dd4fc9f9dda66970e827d13f7c73fe841c' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 50 processed earlier; will process 252 files now Step #5: Running test ["env", "-v", "--chdir=/tmp"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "=7C🪓G", "nbPf=("] Step #5: === Compare result for: env ["-v", "=7C🪓G", "nbPf=("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: nbPf=( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: nbPf=( Step #5: =7C🪓G Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: nbPf=( Step #5: +=7C🪓G Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =7C🪓G Step #5: setenv: nbPf=( Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=7C🪓G Step #5: +setenv: nbPf=( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=7C🪓G", "nbPf=("] Step #5: Step #5: thread '' (3794) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=7C🪓G", "nbPf=("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3794== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x77, Step #5: w Step #5: artifact_prefix='./'; Test unit written to ./crash-aff024fe4ab0fece4091de044c58c9ae4233383a Step #5: Base64: dw== Step #5: MERGE-OUTER: attempt 30 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765386870 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/aff024fe4ab0fece4091de044c58c9ae4233383a' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 52 processed earlier; will process 250 files now Step #5: Running test ["env", "-i", "="] Step #5: === Compare result for: env ["-i", "="] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: = Step #5: Step #5: --- START diff Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "="] Step #5: Step #5: thread '' (3887) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3887== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7, Step #5: \007 Step #5: artifact_prefix='./'; Test unit written to ./crash-5d1be7e9dda1ee8896be5b7e34a85ee16452a7b4 Step #5: Base64: Bw== Step #5: MERGE-OUTER: attempt 31 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765396750 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5d1be7e9dda1ee8896be5b7e34a85ee16452a7b4' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 53 processed earlier; will process 249 files now Step #5: Running test ["env", "zÃd=3YX🔗g", "e\u{fe0f}=11L"] Step #5: === Compare result for: env ["zÃd=3YX🔗g", "e\u{fe0f}=11L"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: zÃd=3YX🔗g Step #5: e️=11L Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: e️=11L Step #5: zÃd=3YX🔗g Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -zÃd=3YX🔗g Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: e️=11L Step #5: +zÃd=3YX🔗g Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["zÃd=3YX🔗g", "e\u{fe0f}=11L"] Step #5: Step #5: thread '' (3966) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["zÃd=3YX🔗g", "e\u{fe0f}=11L"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==3966== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf3, Step #5: \363 Step #5: artifact_prefix='./'; Test unit written to ./crash-0a80baa1797615faddb0ccfaa6d46382a6b3e0e2 Step #5: Base64: 8w== Step #5: MERGE-OUTER: attempt 32 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765408091 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0a80baa1797615faddb0ccfaa6d46382a6b3e0e2' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 54 processed earlier; will process 248 files now Step #5: Running test ["env", "-i", "-0", "-v"] Step #5: === Compare result for: env ["-i", "-0", "-v"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-u=mm2Ãeu", "DMHT=hq🔗jo"] Step #5: === Compare result for: env ["-0", "-u=mm2Ãeu", "DMHT=hq🔗jo"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=mm2\303\203eu': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=mm2\303\203eu': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=mm2Ãeu", "DMHT=hq🔗jo"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "--chdir=/tmp", "WQ58="] Step #5: === Compare result for: env ["--chdir=/tmp", "WQ58="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "WQ58="] Step #5: Step #5: Running test ["env", "-i", "="] Step #5: === Compare result for: env ["-i", "="] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: = Step #5: Step #5: --- START diff Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "="] Step #5: Step #5: thread '' (4048) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4048== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x46, Step #5: F Step #5: artifact_prefix='./'; Test unit written to ./crash-e69f20e9f683920d3fb4329abd951e878b1f9372 Step #5: Base64: Rg== Step #5: MERGE-OUTER: attempt 33 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765423461 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e69f20e9f683920d3fb4329abd951e878b1f9372' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 58 processed earlier; will process 244 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (4159) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4159== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x55, Step #5: U Step #5: artifact_prefix='./'; Test unit written to ./crash-b2c7c0caa10a0cca5ea7d69e54018ae0c0389dd6 Step #5: Base64: VQ== Step #5: MERGE-OUTER: attempt 34 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765435131 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b2c7c0caa10a0cca5ea7d69e54018ae0c0389dd6' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 59 processed earlier; will process 243 files now Step #5: Running test ["env", "-i", "-v", "-vv", "-u=⚙47"] Step #5: === Compare result for: env ["-i", "-v", "-vv", "-u=⚙47"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-v", "-vv", "-u=⚙47"] Step #5: Step #5: thread '' (4249) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-v", "-vv", "-u=⚙47"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4249== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x56, Step #5: V Step #5: artifact_prefix='./'; Test unit written to ./crash-c9ee5681d3c59f7541c27a38b67edf46259e187b Step #5: Base64: Vg== Step #5: MERGE-OUTER: attempt 35 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765444901 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c9ee5681d3c59f7541c27a38b67edf46259e187b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 60 processed earlier; will process 242 files now Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (4297) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4297== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x19, Step #5: \031 Step #5: artifact_prefix='./'; Test unit written to ./crash-e9c5d7db93a1c17d45c5820daf458224bfa7a725 Step #5: Base64: GQ== Step #5: MERGE-OUTER: attempt 36 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765455672 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e9c5d7db93a1c17d45c5820daf458224bfa7a725' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 61 processed earlier; will process 241 files now Step #5: Running test ["env", "-0", "--chdir=/tmp", "uq=r🔩"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "uq=r🔩"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "uq=r🔩"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=Ã", "ÃÃ4Ã(=mvW", "qÃgT🪓=1jÃA"] Step #5: === Compare result for: env ["-u=Ã", "ÃÃ4Ã(=mvW", "qÃgT🪓=1jÃA"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\303\203': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\303\203': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=Ã", "ÃÃ4Ã(=mvW", "qÃgT🪓=1jÃA"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-vv", "-u=", "9oQ=Q0H", "2zNq5="] Step #5: === Compare result for: env ["-v", "-vv", "-u=", "9oQ=Q0H", "2zNq5="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "-u=", "9oQ=Q0H", "2zNq5="] Step #5: Step #5: Running test ["env", "--chdir=/tmp", "o=jhbiD"] Step #5: === Compare result for: env ["--chdir=/tmp", "o=jhbiD"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "o=jhbiD"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "P(P2z=6cÃ", "IYsJ=5PK"] Step #5: === Compare result for: env ["P(P2z=6cÃ", "IYsJ=5PK"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: P(P2z=6cà Step #5: IYsJ=5PK Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: IYsJ=5PK Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: P(P2z=6cà Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +IYsJ=5PK Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +P(P2z=6cà Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -P(P2z=6cà Step #5: -IYsJ=5PK Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["P(P2z=6cÃ", "IYsJ=5PK"] Step #5: Step #5: thread '' (4381) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["P(P2z=6cÃ", "IYsJ=5PK"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4381== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3b,0xc4, Step #5: ;\304 Step #5: artifact_prefix='./'; Test unit written to ./crash-1e12158659b896b5f3b950000429d4da52e38e88 Step #5: Base64: O8Q= Step #5: MERGE-OUTER: attempt 37 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765475093 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1e12158659b896b5f3b950000429d4da52e38e88' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 66 processed earlier; will process 236 files now Step #5: Running test ["env", "-v", "--chdir=/tmp", "U(Ã=P1", "3O=l"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "U(Ã=P1", "3O=l"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: U(Ã=P1 Step #5: setenv: 3O=l Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +U(Ã=P1 Step #5: +setenv: 3O=l Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "U(Ã=P1", "3O=l"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=nH"] Step #5: === Compare result for: env ["-u=nH"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=nH': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=nH': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=nH"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "--chdir=/tmp"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp"] Step #5: Step #5: Running test ["env", "-vv", "9D\u{fe0f}=\u{fe0f}Y⚙E4", "=tDLN"] Step #5: === Compare result for: env ["-vv", "9D\u{fe0f}=\u{fe0f}Y⚙E4", "=tDLN"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 9D️=️Y⚙E4 Step #5: Step #5: GNU stdout: Step #5: 9D️=️Y⚙E4 Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =tDLN Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +9D️=️Y⚙E4 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -9D️=️Y⚙E4 Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=tDLN Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '9D️=️Y⚙E4' Step #5: arg[3]: '=tDLN' Step #5: fuzz_env: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: 9D️=️Y⚙E4 Step #5: setenv: =tDLN Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '9D️=️Y⚙E4' Step #5: -arg[3]: '=tDLN' Step #5: -fuzz_env: warning: env-warning-no-name-specified Step #5: +9D️=️Y⚙E4 Step #5: +setenv: =tDLN Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "9D\u{fe0f}=\u{fe0f}Y⚙E4", "=tDLN"] Step #5: Step #5: thread '' (4528) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "9D\u{fe0f}=\u{fe0f}Y⚙E4", "=tDLN"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4528== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x99,0x78, Step #5: \231x Step #5: artifact_prefix='./'; Test unit written to ./crash-7af2e869dffbcf96cd77dbf2a94d4970cbfc1778 Step #5: Base64: mXg= Step #5: MERGE-OUTER: attempt 38 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765493009 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7af2e869dffbcf96cd77dbf2a94d4970cbfc1778' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 70 processed earlier; will process 232 files now Step #5: Running test ["env", "-v", "=nx(eA", "QMs=FTÃ🧰"] Step #5: === Compare result for: env ["-v", "=nx(eA", "QMs=FTÃ🧰"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: QMs=FTÃ🧰 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: QMs=FTÃ🧰 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =nx(eA Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +QMs=FTÃ🧰 Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -QMs=FTÃ🧰 Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=nx(eA Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =nx(eA Step #5: setenv: QMs=FTÃ🧰 Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=nx(eA Step #5: +setenv: QMs=FTÃ🧰 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=nx(eA", "QMs=FTÃ🧰"] Step #5: Step #5: thread '' (4661) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=nx(eA", "QMs=FTÃ🧰"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4661== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf8,0x32, Step #5: \3702 Step #5: artifact_prefix='./'; Test unit written to ./crash-7ae5ca0040b83bf7a08760aa51b37a5e16cae090 Step #5: Base64: +DI= Step #5: MERGE-OUTER: attempt 39 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765504283 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7ae5ca0040b83bf7a08760aa51b37a5e16cae090' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 71 processed earlier; will process 231 files now Step #5: Running test ["env", "-v", "=\u{fe0f}ij", "T2=ZQ5Ks"] Step #5: === Compare result for: env ["-v", "=\u{fe0f}ij", "T2=ZQ5Ks"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: T2=ZQ5Ks Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: T2=ZQ5Ks Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =️ij Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: -WORK=/work Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: T2=ZQ5Ks Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=️ij Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =️ij Step #5: setenv: T2=ZQ5Ks Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=️ij Step #5: +setenv: T2=ZQ5Ks Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=\u{fe0f}ij", "T2=ZQ5Ks"] Step #5: Step #5: thread '' (4744) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=\u{fe0f}ij", "T2=ZQ5Ks"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4744== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2d,0xdb, Step #5: -\333 Step #5: artifact_prefix='./'; Test unit written to ./crash-0052e3878415c3845222394c77166cf9a178f078 Step #5: Base64: Lds= Step #5: MERGE-OUTER: attempt 40 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765515286 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0052e3878415c3845222394c77166cf9a178f078' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 72 processed earlier; will process 230 files now Step #5: Running test ["env", "-vv", "--chdir=/tmp", "x=AqW", "DJ=k🔩(aN"] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp", "x=AqW", "DJ=k🔩(aN"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: arg[3]: 'x=AqW' Step #5: arg[4]: 'DJ=k🔩(aN' Step #5: fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: x=AqW Step #5: setenv: DJ=k🔩(aN Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -arg[3]: 'x=AqW' Step #5: -arg[4]: 'DJ=k🔩(aN' Step #5: -fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +x=AqW Step #5: +setenv: DJ=k🔩(aN Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp", "x=AqW", "DJ=k🔩(aN"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "eLGZB=U8"] Step #5: === Compare result for: env ["eLGZB=U8"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: eLGZB=U8 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: eLGZB=U8 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: eLGZB=U8 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["eLGZB=U8"] Step #5: Step #5: thread '' (4821) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["eLGZB=U8"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4821== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x26,0x80, Step #5: &\200 Step #5: artifact_prefix='./'; Test unit written to ./crash-25e449b8101ca004096e83035cbcb94f6b5ef08b Step #5: Base64: JoA= Step #5: MERGE-OUTER: attempt 41 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765528931 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/25e449b8101ca004096e83035cbcb94f6b5ef08b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 74 processed earlier; will process 228 files now Step #5: Running test ["env", "-i", "-v", "--chdir=/tmp", "=I🧰D"] Step #5: === Compare result for: env ["-i", "-v", "--chdir=/tmp", "=I🧰D"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: =I🧰D Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +=I🧰D Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "--chdir=/tmp", "=I🧰D"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=h🔗"] Step #5: === Compare result for: env ["-u=h🔗"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=h\360\237\224\227': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=h\360\237\224\227': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=h🔗"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: Running test ["env", "-u=uL9", "--chdir=/tmp", "9GuV6="] Step #5: === Compare result for: env ["-u=uL9", "--chdir=/tmp", "9GuV6="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=uL9': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=uL9': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=uL9", "--chdir=/tmp", "9GuV6="] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "R6R=BÃ0", "2=5jyBC"] Step #5: === Compare result for: env ["R6R=BÃ0", "2=5jyBC"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: R6R=BÃ0 Step #5: 2=5jyBC Step #5: Step #5: GNU stdout: Step #5: 2=5jyBC Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: R6R=BÃ0 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +2=5jyBC Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +R6R=BÃ0 Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -R6R=BÃ0 Step #5: -2=5jyBC Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["R6R=BÃ0", "2=5jyBC"] Step #5: Step #5: thread '' (4916) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["R6R=BÃ0", "2=5jyBC"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==4916== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x74,0x2d, Step #5: t- Step #5: artifact_prefix='./'; Test unit written to ./crash-944b063e0f384e9efd9baca7d369bbc41f62798a Step #5: Base64: dC0= Step #5: MERGE-OUTER: attempt 42 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765546324 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/944b063e0f384e9efd9baca7d369bbc41f62798a' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 79 processed earlier; will process 223 files now Step #5: Running test ["env", "-i", "-0"] Step #5: === Compare result for: env ["-i", "-0"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "--chdir=/tmp"] Step #5: === Compare result for: env ["-i", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "--chdir=/tmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=⚙H"] Step #5: === Compare result for: env ["-u=⚙H"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\342\232\231H': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\342\232\231H': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=⚙H"] Step #5: Step #5: Running test ["env", "-v", "E=hP1(a"] Step #5: === Compare result for: env ["-v", "E=hP1(a"] Step #5: Rust stdout: Step #5: E=hP1(a Step #5: Step #5: GNU stdout: Step #5: E=hP1(a Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: E=hP1(a Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: E=hP1(a Step #5: --- START diff Step #5: +E=hP1(a Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "E=hP1(a"] Step #5: Step #5: thread '' (5049) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "E=hP1(a"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5049== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xdf,0x94, Step #5: \337\224 Step #5: artifact_prefix='./'; Test unit written to ./crash-2c55ce7defaff3ffb1eeffa6f81f00c60904c31f Step #5: Base64: 35Q= Step #5: MERGE-OUTER: attempt 43 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765562237 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2c55ce7defaff3ffb1eeffa6f81f00c60904c31f' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 83 processed earlier; will process 219 files now Step #5: Running test ["env", "-i", "rRTÃ=(sK2"] Step #5: === Compare result for: env ["-i", "rRTÃ=(sK2"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-0", "-vv"] Step #5: === Compare result for: env ["-i", "-0", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-0' Step #5: arg[3]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-0' Step #5: -arg[3]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "-vv"] Step #5: Step #5: Running test ["env", "-i", "-vv", "-u=M", "jr="] Step #5: === Compare result for: env ["-i", "-vv", "-u=M", "jr="] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: jr= Step #5: Step #5: --- START diff Step #5: +jr= Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: jr= Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +jr= Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-vv", "-u=M", "jr="] Step #5: Step #5: thread '' (5146) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-vv", "-u=M", "jr="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5146== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x9f,0x66, Step #5: \237f Step #5: artifact_prefix='./'; Test unit written to ./crash-2ceeec5963ebe12d00f974ff77b628c7b420b14c Step #5: Base64: n2Y= Step #5: MERGE-OUTER: attempt 44 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765578763 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2ceeec5963ebe12d00f974ff77b628c7b420b14c' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 87 processed earlier; will process 215 files now Step #5: Running test ["env", "-0", "P🔩aC=K2SX4"] Step #5: === Compare result for: env ["-0", "P🔩aC=K2SX4"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workP🔩aC=K2SX4 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64P🔩aC=K2SX4RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workP🔩aC=K2SX4 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64P🔩aC=K2SX4RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "P🔩aC=K2SX4"] Step #5: Step #5: thread '' (5255) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "P🔩aC=K2SX4"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5255== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xdf,0x54, Step #5: \337T Step #5: artifact_prefix='./'; Test unit written to ./crash-c8b7efe7d2eddda547b17004169c392fdf7e2ba1 Step #5: Base64: 31Q= Step #5: MERGE-OUTER: attempt 45 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765588575 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c8b7efe7d2eddda547b17004169c392fdf7e2ba1' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 88 processed earlier; will process 214 files now Step #5: Running test ["env", "-i", "-v", "=ÃQRbv", "7ww🧰=ÃK7"] Step #5: === Compare result for: env ["-i", "-v", "=ÃQRbv", "7ww🧰=ÃK7"] Step #5: Rust stdout: Step #5: 7ww🧰=ÃK7 Step #5: Step #5: GNU stdout: Step #5: =ÃQRbv Step #5: 7ww🧰=ÃK7 Step #5: Step #5: --- START diff Step #5: +=ÃQRbv Step #5: 7ww🧰=ÃK7 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =ÃQRbv Step #5: setenv: 7ww🧰=ÃK7 Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=ÃQRbv Step #5: +setenv: 7ww🧰=ÃK7 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "-v", "=ÃQRbv", "7ww🧰=ÃK7"] Step #5: Step #5: thread '' (5306) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-v", "=ÃQRbv", "7ww🧰=ÃK7"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5306== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x47,0x2f, Step #5: G/ Step #5: artifact_prefix='./'; Test unit written to ./crash-6afd95183b4881d723c6a704ccf55377bfb0c6a8 Step #5: Base64: Ry8= Step #5: MERGE-OUTER: attempt 46 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765600860 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/6afd95183b4881d723c6a704ccf55377bfb0c6a8' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 89 processed earlier; will process 213 files now Step #5: Running test ["env", "-i", "-v"] Step #5: === Compare result for: env ["-i", "-v"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "=o", "v🔩🪓by=3E"] Step #5: === Compare result for: env ["-v", "=o", "v🔩🪓by=3E"] Step #5: Rust stdout: Step #5: v🔩🪓by=3E Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: v🔩🪓by=3E Step #5: =o Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: v🔩🪓by=3E Step #5: +=o Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =o Step #5: setenv: v🔩🪓by=3E Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=o Step #5: +setenv: v🔩🪓by=3E Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=o", "v🔩🪓by=3E"] Step #5: Step #5: thread '' (5389) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=o", "v🔩🪓by=3E"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5389== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7b,0x19, Step #5: {\031 Step #5: artifact_prefix='./'; Test unit written to ./crash-c8d8cbb0d773b4e889d878f96a89387e6bae28b9 Step #5: Base64: exk= Step #5: MERGE-OUTER: attempt 47 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765611877 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c8d8cbb0d773b4e889d878f96a89387e6bae28b9' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 91 processed earlier; will process 211 files now Step #5: Running test ["env", "Ws=7bzoa", "=iqXR"] Step #5: === Compare result for: env ["Ws=7bzoa", "=iqXR"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Ws=7bzoa Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: Ws=7bzoa Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =iqXR Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: Ws=7bzoa Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=iqXR Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["Ws=7bzoa", "=iqXR"] Step #5: Step #5: thread '' (5476) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Ws=7bzoa", "=iqXR"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5476== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x4e,0x55, Step #5: NU Step #5: artifact_prefix='./'; Test unit written to ./crash-fde432f9941c92f8d896d7d0e4c28bbf95d1087a Step #5: Base64: TlU= Step #5: MERGE-OUTER: attempt 48 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765622644 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/fde432f9941c92f8d896d7d0e4c28bbf95d1087a' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 92 processed earlier; will process 210 files now Step #5: Running test ["env", "-0", "-vv", "-u=Uy", "2🔗=8"] Step #5: === Compare result for: env ["-0", "-vv", "-u=Uy", "2🔗=8"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =Uy Step #5: env: cannot unset '=Uy': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=Uy Step #5: +env: cannot unset '=Uy': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-vv", "-u=Uy", "2🔗=8"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (5548) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5548== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x27,0x27, Step #5: '' Step #5: artifact_prefix='./'; Test unit written to ./crash-b6ee60926c0a426addcbb7e087d4274498f35b1c Step #5: Base64: Jyc= Step #5: MERGE-OUTER: attempt 49 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765634749 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b6ee60926c0a426addcbb7e087d4274498f35b1c' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 94 processed earlier; will process 208 files now Step #5: Running test ["env", "-i", "-v", "Ef\u{fe0f}=Ãn2QU"] Step #5: === Compare result for: env ["-i", "-v", "Ef\u{fe0f}=Ãn2QU"] Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: Ef️=Ãn2QU Step #5: --- START diff Step #5: +Ef️=Ãn2QU Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-v", "Ef\u{fe0f}=Ãn2QU"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-v", "0⚙n=aM"] Step #5: === Compare result for: env ["-0", "-v", "0⚙n=aM"] Step #5: Rust stdout: Step #5: Ef️=Ãn2QU0⚙n=aM Step #5: GNU stdout: Step #5: 0⚙n=aMEf️=Ãn2QULC_ALL=C Step #5: --- START diff Step #5: -Ef️=Ãn2QU0⚙n=aM Step #5: +0⚙n=aMEf️=Ãn2QULC_ALL=C Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 0⚙n=aM Step #5: --- START diff Step #5: +0⚙n=aM Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "0⚙n=aM"] Step #5: Step #5: thread '' (5647) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "0⚙n=aM"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5647== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x88,0x0, Step #5: \210\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-c9942e909a823b80df0728be2ba7a8e1689e69ef Step #5: Base64: iAA= Step #5: MERGE-OUTER: attempt 50 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765647059 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c9942e909a823b80df0728be2ba7a8e1689e69ef' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 96 processed earlier; will process 206 files now Step #5: Running test ["env", "-u=a", "--chdir=/tmp"] Step #5: === Compare result for: env ["-u=a", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=a': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=a': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=a", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "EJ9s=Ã7Q", "Io=9Ã🧰5U"] Step #5: === Compare result for: env ["EJ9s=Ã7Q", "Io=9Ã🧰5U"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: EJ9s=Ã7Q Step #5: Io=9Ã🧰5U Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: EJ9s=Ã7Q Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: Io=9Ã🧰5U Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +EJ9s=Ã7Q Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +Io=9Ã🧰5U Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -EJ9s=Ã7Q Step #5: -Io=9Ã🧰5U Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["EJ9s=Ã7Q", "Io=9Ã🧰5U"] Step #5: Step #5: thread '' (5747) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["EJ9s=Ã7Q", "Io=9Ã🧰5U"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5747== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf8,0x3, Step #5: \370\003 Step #5: artifact_prefix='./'; Test unit written to ./crash-19ca53ef1625c1a965cd37eff4616403a7dd212b Step #5: Base64: +AM= Step #5: MERGE-OUTER: attempt 51 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765659632 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/19ca53ef1625c1a965cd37eff4616403a7dd212b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 98 processed earlier; will process 204 files now Step #5: Running test ["env", "-v", "kV🔩sH=7TKG"] Step #5: === Compare result for: env ["-v", "kV🔩sH=7TKG"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: kV🔩sH=7TKG Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: kV🔩sH=7TKG Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: kV🔩sH=7TKG Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: kV🔩sH=7TKG Step #5: --- START diff Step #5: +kV🔩sH=7TKG Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "kV🔩sH=7TKG"] Step #5: Step #5: thread '' (5828) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "kV🔩sH=7TKG"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5828== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x47,0x62, Step #5: Gb Step #5: artifact_prefix='./'; Test unit written to ./crash-908e72b40950d856c8f9c951160019687fa69465 Step #5: Base64: R2I= Step #5: MERGE-OUTER: attempt 52 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765671476 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/908e72b40950d856c8f9c951160019687fa69465' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 99 processed earlier; will process 203 files now Step #5: Running test ["env", "-i", "kk="] Step #5: === Compare result for: env ["-i", "kk="] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "I="] Step #5: === Compare result for: env ["I="] Step #5: Rust stdout: Step #5: kk= Step #5: I= Step #5: Step #5: GNU stdout: Step #5: I= Step #5: LC_ALL=C Step #5: kk= Step #5: Step #5: --- START diff Step #5: -kk= Step #5: I= Step #5: +LC_ALL=C Step #5: +kk= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["I="] Step #5: Step #5: thread '' (5900) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["I="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5900== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x5c, Step #5: [\\ Step #5: artifact_prefix='./'; Test unit written to ./crash-e1e495c83774cbc3915a350c0584376579f4a876 Step #5: Base64: W1w= Step #5: MERGE-OUTER: attempt 53 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765683027 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e1e495c83774cbc3915a350c0584376579f4a876' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 101 processed earlier; will process 201 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (5982) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==5982== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x26,0x5e, Step #5: &^ Step #5: artifact_prefix='./'; Test unit written to ./crash-acd6c2a4f9442f0efb498466be20ff817466cb80 Step #5: Base64: Jl4= Step #5: MERGE-OUTER: attempt 54 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765693984 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/acd6c2a4f9442f0efb498466be20ff817466cb80' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 102 processed earlier; will process 200 files now Step #5: Running test ["env", "-vv", "E7⚙=Cgo"] Step #5: === Compare result for: env ["-vv", "E7⚙=Cgo"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: E7⚙=Cgo Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: E7⚙=Cgo Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +E7⚙=Cgo Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -E7⚙=Cgo Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'E7⚙=Cgo' Step #5: GNU stderr: Step #5: E7⚙=Cgo Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'E7⚙=Cgo' Step #5: +E7⚙=Cgo Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "E7⚙=Cgo"] Step #5: Step #5: thread '' (6062) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "E7⚙=Cgo"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6062== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x4e,0xa, Step #5: N\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-57ac1ab969a67700b42d8a97746c69b5af039b39 Step #5: Base64: Tgo= Step #5: MERGE-OUTER: attempt 55 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765705639 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/57ac1ab969a67700b42d8a97746c69b5af039b39' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 103 processed earlier; will process 199 files now Step #5: Running test ["env", "-vv", "9(Gw=⚙"] Step #5: === Compare result for: env ["-vv", "9(Gw=⚙"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 9(Gw=⚙ Step #5: Step #5: GNU stdout: Step #5: 9(Gw=⚙ Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +9(Gw=⚙ Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -9(Gw=⚙ Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '9(Gw=⚙' Step #5: GNU stderr: Step #5: 9(Gw=⚙ Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '9(Gw=⚙' Step #5: +9(Gw=⚙ Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "9(Gw=⚙"] Step #5: Step #5: thread '' (6143) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "9(Gw=⚙"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6143== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x30, Step #5: 00 Step #5: artifact_prefix='./'; Test unit written to ./crash-fb96549631c835eb239cd614cc6b5cb7d295121a Step #5: Base64: MDA= Step #5: MERGE-OUTER: attempt 56 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765718650 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/fb96549631c835eb239cd614cc6b5cb7d295121a' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 104 processed earlier; will process 198 files now Step #5: Running test ["env", "-0", "Q🧰(=VW9JU", "U🧰sC=🔗"] Step #5: === Compare result for: env ["-0", "Q🧰(=VW9JU", "U🧰sC=🔗"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workQ🧰(=VW9JUU🧰sC=🔗 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64Q🧰(=VW9JURESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3U🧰sC=🔗WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workQ🧰(=VW9JUU🧰sC=🔗 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64Q🧰(=VW9JURESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3U🧰sC=🔗WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "Q🧰(=VW9JU", "U🧰sC=🔗"] Step #5: Step #5: thread '' (6232) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "Q🧰(=VW9JU", "U🧰sC=🔗"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6232== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x11,0x0, Step #5: \021\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-7156d4cc436b517b16046ba39f6fa35a225096bd Step #5: Base64: EQA= Step #5: MERGE-OUTER: attempt 57 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765728866 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7156d4cc436b517b16046ba39f6fa35a225096bd' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 105 processed earlier; will process 197 files now Step #5: Running test ["env", "-u="] Step #5: === Compare result for: env ["-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=⚙oa(id", "C(=9HT"] Step #5: === Compare result for: env ["-u=⚙oa(id", "C(=9HT"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\342\232\231oa(id': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\342\232\231oa(id': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=⚙oa(id", "C(=9HT"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-vv", "M7yxW=xF("] Step #5: === Compare result for: env ["-vv", "M7yxW=xF("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: M7yxW=xF( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: M7yxW=xF( Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +M7yxW=xF( Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -M7yxW=xF( Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'M7yxW=xF(' Step #5: GNU stderr: Step #5: M7yxW=xF( Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'M7yxW=xF(' Step #5: +M7yxW=xF( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "M7yxW=xF("] Step #5: Step #5: thread '' (6295) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "M7yxW=xF("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6295== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x23,0x0, Step #5: #\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-0b0feb3147ce20eb2c90076367f895c59bcd14b3 Step #5: Base64: IwA= Step #5: MERGE-OUTER: attempt 58 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765742271 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0b0feb3147ce20eb2c90076367f895c59bcd14b3' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 108 processed earlier; will process 194 files now Step #5: Running test ["env", "-i", "=", "="] Step #5: === Compare result for: env ["-i", "=", "="] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: = Step #5: Step #5: --- START diff Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: fuzz_env: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: -fuzz_env: warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "=", "="] Step #5: Step #5: thread '' (6403) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "=", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6403== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xad,0x30, Step #5: \2550 Step #5: artifact_prefix='./'; Test unit written to ./crash-31a0c85458b685c14829abf0a0df1923fb90c928 Step #5: Base64: rTA= Step #5: MERGE-OUTER: attempt 59 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765753616 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/31a0c85458b685c14829abf0a0df1923fb90c928' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 109 processed earlier; will process 193 files now Step #5: Running test ["env", "-vv", "-u=9"] Step #5: === Compare result for: env ["-vv", "-u=9"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =9 Step #5: env: cannot unset '=9': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=9 Step #5: +env: cannot unset '=9': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=9"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-u=(", "V="] Step #5: === Compare result for: env ["-i", "-u=(", "V="] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: V= Step #5: Step #5: --- START diff Step #5: +V= Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=(", "V="] Step #5: Step #5: thread '' (6490) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=(", "V="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6490== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xdf,0x9f, Step #5: \337\237 Step #5: artifact_prefix='./'; Test unit written to ./crash-d56b374bf7474b027de87d2372bd7ff15fd5cda8 Step #5: Base64: 358= Step #5: MERGE-OUTER: attempt 60 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765765569 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/d56b374bf7474b027de87d2372bd7ff15fd5cda8' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 111 processed earlier; will process 191 files now Step #5: Running test ["env", "=(gR7G", "ÃS=C(V2"] Step #5: === Compare result for: env ["=(gR7G", "ÃS=C(V2"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: ÃS=C(V2 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ÃS=C(V2 Step #5: =(gR7G Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ÃS=C(V2 Step #5: +=(gR7G Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=(gR7G", "ÃS=C(V2"] Step #5: Step #5: thread '' (6574) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=(gR7G", "ÃS=C(V2"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6574== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xe1,0xe1, Step #5: \341\341 Step #5: artifact_prefix='./'; Test unit written to ./crash-075acfbf92d8f8159a42064ffaa639d86b48d89d Step #5: Base64: 4eE= Step #5: MERGE-OUTER: attempt 61 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765776499 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/075acfbf92d8f8159a42064ffaa639d86b48d89d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 112 processed earlier; will process 190 files now Step #5: Running test ["env", "-0", "-v", "-vv"] Step #5: === Compare result for: env ["-0", "-v", "-vv"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-v' Step #5: arg[3]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-v' Step #5: -arg[3]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "-vv"] Step #5: Step #5: thread '' (6652) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6652== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa3,0x80, Step #5: \243\200 Step #5: artifact_prefix='./'; Test unit written to ./crash-d0cc4ea6e02e74d1b55ccda2b62cdfea293fb42d Step #5: Base64: o4A= Step #5: MERGE-OUTER: attempt 62 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765787587 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/d0cc4ea6e02e74d1b55ccda2b62cdfea293fb42d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 113 processed earlier; will process 189 files now Step #5: Running test ["env", "-v", "--chdir=/tmp", "Ur🔗=ptgG"] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "Ur🔗=ptgG"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: Ur🔗=ptgG Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +Ur🔗=ptgG Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "Ur🔗=ptgG"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-vv"] Step #5: === Compare result for: env ["-vv"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv"] Step #5: Step #5: thread '' (6735) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6735== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xd0,0xb0, Step #5: \320\260 Step #5: artifact_prefix='./'; Test unit written to ./crash-51b4eac98af84251c4ea43be6cbb444dc0e2c450 Step #5: Base64: 0LA= Step #5: MERGE-OUTER: attempt 63 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765801266 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/51b4eac98af84251c4ea43be6cbb444dc0e2c450' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 115 processed earlier; will process 187 files now Step #5: Running test ["env", "-u=hpÃ"] Step #5: === Compare result for: env ["-u=hpÃ"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=hp\303\203': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=hp\303\203': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=hpÃ"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-v", "-u=huo"] Step #5: === Compare result for: env ["-i", "-v", "-u=huo"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-v", "-u=huo"] Step #5: Step #5: thread '' (6808) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-v", "-u=huo"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6808== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xef,0x44, Step #5: \357D Step #5: artifact_prefix='./'; Test unit written to ./crash-75a2478bbc175922aecc3dfad6fd525b8e16e1f6 Step #5: Base64: 70Q= Step #5: MERGE-OUTER: attempt 64 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765812911 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/75a2478bbc175922aecc3dfad6fd525b8e16e1f6' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 117 processed earlier; will process 185 files now Step #5: Running test ["env", "4=(mKVv"] Step #5: === Compare result for: env ["4=(mKVv"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 4=(mKVv Step #5: Step #5: GNU stdout: Step #5: 4=(mKVv Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +4=(mKVv Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -4=(mKVv Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["4=(mKVv"] Step #5: Step #5: thread '' (6889) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["4=(mKVv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6889== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x74,0x9,0x74, Step #5: t\011t Step #5: artifact_prefix='./'; Test unit written to ./crash-bb96f2330539a733310785bdf2b7d1f162cbe226 Step #5: Base64: dAl0 Step #5: MERGE-OUTER: attempt 65 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765824206 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/bb96f2330539a733310785bdf2b7d1f162cbe226' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 118 processed earlier; will process 184 files now Step #5: Running test ["env", "-v", "YhxiS=KGU"] Step #5: === Compare result for: env ["-v", "YhxiS=KGU"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: YhxiS=KGU Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: YhxiS=KGU Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: YhxiS=KGU Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: YhxiS=KGU Step #5: --- START diff Step #5: +YhxiS=KGU Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "YhxiS=KGU"] Step #5: Step #5: thread '' (6954) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "YhxiS=KGU"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==6954== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0xe9,0x49, Step #5: \000\351I Step #5: artifact_prefix='./'; Test unit written to ./crash-c43234197c730db32dd775cbcbacb766420311ea Step #5: Base64: AOlJ Step #5: MERGE-OUTER: attempt 66 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765835461 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c43234197c730db32dd775cbcbacb766420311ea' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 119 processed earlier; will process 183 files now Step #5: Running test ["env", "-i", "-u=9U"] Step #5: === Compare result for: env ["-i", "-u=9U"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=9U"] Step #5: Step #5: thread '' (7031) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=9U"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7031== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x23,0xcc,0x0, Step #5: #\314\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-e3f2840de306c555498fbc29b3aaa0858c402840 Step #5: Base64: I8wA Step #5: MERGE-OUTER: attempt 67 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765844678 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e3f2840de306c555498fbc29b3aaa0858c402840' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 120 processed earlier; will process 182 files now Step #5: Running test ["env", "-i", "-0", "-v", "-vv", "-u=🔩CQ", "=VwRQ"] Step #5: === Compare result for: env ["-i", "-0", "-v", "-vv", "-u=🔩CQ", "=VwRQ"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: =VwRQ Step #5: --- START diff Step #5: +=VwRQ Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =VwRQ Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=VwRQ Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-0", "-v", "-vv", "-u=🔩CQ", "=VwRQ"] Step #5: Step #5: thread '' (7071) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-0", "-v", "-vv", "-u=🔩CQ", "=VwRQ"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7071== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x22,0xa,0xa, Step #5: \"\012\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-c08533889c7d508ebfb2111021f48b3415424124 Step #5: Base64: IgoK Step #5: MERGE-OUTER: attempt 68 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765855476 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c08533889c7d508ebfb2111021f48b3415424124' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 121 processed earlier; will process 181 files now Step #5: Running test ["env", "-v", "-vv", "--chdir=/tmp"] Step #5: === Compare result for: env ["-v", "-vv", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: arg[3]: '--chdir=/tmp' Step #5: fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: '--chdir=/tmp' Step #5: -fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u="] Step #5: === Compare result for: env ["-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (7129) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7129== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x2d,0x2a, Step #5: [-* Step #5: artifact_prefix='./'; Test unit written to ./crash-c4165872b6ebd18a0e522e55cf1c743eb4562af7 Step #5: Base64: Wy0q Step #5: MERGE-OUTER: attempt 69 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765870055 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c4165872b6ebd18a0e522e55cf1c743eb4562af7' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 124 processed earlier; will process 178 files now Step #5: Running test ["env", "-u=JM1", "0WyLk=kS"] Step #5: === Compare result for: env ["-u=JM1", "0WyLk=kS"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=JM1': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=JM1': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=JM1", "0WyLk=kS"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-v"] Step #5: === Compare result for: env ["-i", "-v"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=Jggiz(W", "Bjk=3"] Step #5: === Compare result for: env ["-u=Jggiz(W", "Bjk=3"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=Jggiz(W': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=Jggiz(W': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=Jggiz(W", "Bjk=3"] Step #5: Step #5: Running test ["env", "-u=pP", "--chdir=/tmp", "(c=nLM", "WLS="] Step #5: === Compare result for: env ["-u=pP", "--chdir=/tmp", "(c=nLM", "WLS="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=pP': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=pP': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=pP", "--chdir=/tmp", "(c=nLM", "WLS="] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "xL(=GM", "ÃcRÃ1=Kzhu"] Step #5: === Compare result for: env ["xL(=GM", "ÃcRÃ1=Kzhu"] Step #5: Rust stdout: Step #5: xL(=GM Step #5: ÃcRÃ1=Kzhu Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: xL(=GM Step #5: ÃcRÃ1=Kzhu Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: xL(=GM Step #5: ÃcRÃ1=Kzhu Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["xL(=GM", "ÃcRÃ1=Kzhu"] Step #5: Step #5: thread '' (7215) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["xL(=GM", "ÃcRÃ1=Kzhu"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7215== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x32,0xa,0x7f, Step #5: 2\012\177 Step #5: artifact_prefix='./'; Test unit written to ./crash-c7b387f24b3ed5c24bf6ddc325bed3ac83c30ad0 Step #5: Base64: Mgp/ Step #5: MERGE-OUTER: attempt 70 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765886163 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c7b387f24b3ed5c24bf6ddc325bed3ac83c30ad0' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 129 processed earlier; will process 173 files now Step #5: Running test ["env", "-i", "-0", "-vv", "-u=yb(", "Kg=TÃiie", "yeIW=r🔩L"] Step #5: === Compare result for: env ["-i", "-0", "-vv", "-u=yb(", "Kg=TÃiie", "yeIW=r🔩L"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: Kg=TÃiieyeIW=r🔩L Step #5: --- START diff Step #5: +Kg=TÃiieyeIW=r🔩L Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: Kg=TÃiie Step #5: setenv: yeIW=r🔩L Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +Kg=TÃiie Step #5: +setenv: yeIW=r🔩L Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-0", "-vv", "-u=yb(", "Kg=TÃiie", "yeIW=r🔩L"] Step #5: Step #5: thread '' (7304) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-0", "-vv", "-u=yb(", "Kg=TÃiie", "yeIW=r🔩L"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7304== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xc,0xc,0xc, Step #5: \014\014\014 Step #5: artifact_prefix='./'; Test unit written to ./crash-a60ff276a96e8af9d5c0d71e27ff8371e6139c98 Step #5: Base64: DAwM Step #5: MERGE-OUTER: attempt 71 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765896689 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/a60ff276a96e8af9d5c0d71e27ff8371e6139c98' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 130 processed earlier; will process 172 files now Step #5: Running test ["env", "k(7M=\u{fe0f}lA\u{fe0f}e", "=V"] Step #5: === Compare result for: env ["k(7M=\u{fe0f}lA\u{fe0f}e", "=V"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: k(7M=️lA️e Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: k(7M=️lA️e Step #5: =V Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: k(7M=️lA️e Step #5: +=V Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["k(7M=\u{fe0f}lA\u{fe0f}e", "=V"] Step #5: Step #5: thread '' (7355) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["k(7M=\u{fe0f}lA\u{fe0f}e", "=V"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7355== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x57,0x5d, Step #5: [W] Step #5: artifact_prefix='./'; Test unit written to ./crash-e0ea57fd7867d76e9f6767daa20d88dc5bffdb05 Step #5: Base64: W1dd Step #5: MERGE-OUTER: attempt 72 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765907355 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e0ea57fd7867d76e9f6767daa20d88dc5bffdb05' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 131 processed earlier; will process 171 files now Step #5: Running test ["env", "-0", "-vv", "vXfdT="] Step #5: === Compare result for: env ["-0", "-vv", "vXfdT="] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workvXfdT= Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEvXfdT= Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workvXfdT= Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEvXfdT= Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-vv' Step #5: arg[3]: 'vXfdT=' Step #5: GNU stderr: Step #5: vXfdT= Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: 'vXfdT=' Step #5: +vXfdT= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-vv", "vXfdT="] Step #5: Step #5: thread '' (7401) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-vv", "vXfdT="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7401== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x30,0x5d, Step #5: [0] Step #5: artifact_prefix='./'; Test unit written to ./crash-1184f5b8d4b6dd08709cf1513f26744167065e0d Step #5: Base64: WzBd Step #5: MERGE-OUTER: attempt 73 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765917312 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1184f5b8d4b6dd08709cf1513f26744167065e0d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 132 processed earlier; will process 170 files now Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (7429) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7429== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x31,0x45,0x31, Step #5: 1E1 Step #5: artifact_prefix='./'; Test unit written to ./crash-648f2517faa4a9739a91298f49666439d974d486 Step #5: Base64: MUUx Step #5: MERGE-OUTER: attempt 74 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765926700 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/648f2517faa4a9739a91298f49666439d974d486' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 133 processed earlier; will process 169 files now Step #5: Running test ["env", "-i", "-0", "-u=tpl", "o04=Y"] Step #5: === Compare result for: env ["-i", "-0", "-u=tpl", "o04=Y"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: o04=Y Step #5: --- START diff Step #5: +o04=Y Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-0", "-u=tpl", "o04=Y"] Step #5: Step #5: thread '' (7462) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-0", "-u=tpl", "o04=Y"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7462== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x23,0x3b,0x6, Step #5: #;\006 Step #5: artifact_prefix='./'; Test unit written to ./crash-3e75a9cd5d2bdc97b9d490aa790b1b49531f819f Step #5: Base64: IzsG Step #5: MERGE-OUTER: attempt 75 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765935976 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3e75a9cd5d2bdc97b9d490aa790b1b49531f819f' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 134 processed earlier; will process 168 files now Step #5: Running test ["env", "-i", "-0"] Step #5: === Compare result for: env ["-i", "-0"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "--chdir=/tmp", "Xm=Q", "F=MMg"] Step #5: === Compare result for: env ["--chdir=/tmp", "Xm=Q", "F=MMg"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "Xm=Q", "F=MMg"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "m8=", "🪓3⚙=Whr7"] Step #5: === Compare result for: env ["m8=", "🪓3⚙=Whr7"] Step #5: Rust stdout: Step #5: m8= Step #5: 🪓3⚙=Whr7 Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: m8= Step #5: 🪓3⚙=Whr7 Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: m8= Step #5: 🪓3⚙=Whr7 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["m8=", "🪓3⚙=Whr7"] Step #5: Step #5: thread '' (7511) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["m8=", "🪓3⚙=Whr7"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7511== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa,0x2,0xd0,0x2, Step #5: \012\002\320\002 Step #5: artifact_prefix='./'; Test unit written to ./crash-25b194ea6749f9167ab59478f26ed5f4c2858445 Step #5: Base64: CgLQAg== Step #5: MERGE-OUTER: attempt 76 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765949464 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/25b194ea6749f9167ab59478f26ed5f4c2858445' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 137 processed earlier; will process 165 files now Step #5: Running test ["env", "-vv", "XQÃD="] Step #5: === Compare result for: env ["-vv", "XQÃD="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: XQÃD= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: XQÃD= Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: XQÃD= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: 'XQÃD=' Step #5: GNU stderr: Step #5: XQÃD= Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: 'XQÃD=' Step #5: +XQÃD= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv", "XQÃD="] Step #5: Step #5: thread '' (7570) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv", "XQÃD="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7570== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x23,0x4e,0x30, Step #5: C#N0 Step #5: artifact_prefix='./'; Test unit written to ./crash-3909d2204f607b305ae5a096c16ada22d0d5f1f5 Step #5: Base64: QyNOMA== Step #5: MERGE-OUTER: attempt 77 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765960416 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3909d2204f607b305ae5a096c16ada22d0d5f1f5' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 138 processed earlier; will process 164 files now Step #5: Running test ["env", "-u=", "sCa=eFF2a", "6=6("] Step #5: === Compare result for: env ["-u=", "sCa=eFF2a", "6=6("] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "sCa=eFF2a", "6=6("] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-vv", "-u=", "--chdir=/tmp", "="] Step #5: === Compare result for: env ["-i", "-vv", "-u=", "--chdir=/tmp", "="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv", "-u=", "--chdir=/tmp", "="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-u=y", "0=Ã", "TJu=I"] Step #5: === Compare result for: env ["-0", "-u=y", "0=Ã", "TJu=I"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=y': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=y': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=y", "0=Ã", "TJu=I"] Step #5: Step #5: Running test ["env", "-v", "=ih"] Step #5: === Compare result for: env ["-v", "=ih"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =ih Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=ih Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =ih Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=ih Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=ih"] Step #5: Step #5: thread '' (7598) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=ih"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7598== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xff,0xa,0x63,0xdc, Step #5: \377\012c\334 Step #5: artifact_prefix='./'; Test unit written to ./crash-d5adac66d7ddc2874b3017427cff6d9e675b03bb Step #5: Base64: /wpj3A== Step #5: MERGE-OUTER: attempt 78 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765975778 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/d5adac66d7ddc2874b3017427cff6d9e675b03bb' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 142 processed earlier; will process 160 files now Step #5: Running test ["env", "-v", "-u=", "=ilR9K", "KÃWzW=kmW"] Step #5: === Compare result for: env ["-v", "-u=", "=ilR9K", "KÃWzW=kmW"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=", "=ilR9K", "KÃWzW=kmW"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-vv", "-u=🧰2K"] Step #5: === Compare result for: env ["-0", "-vv", "-u=🧰2K"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =🧰2K Step #5: env: cannot unset '=\360\237\247\2602K': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=🧰2K Step #5: +env: cannot unset '=\360\237\247\2602K': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-vv", "-u=🧰2K"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (7669) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7669== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2d,0x2d,0x2d,0x2d, Step #5: ---- Step #5: artifact_prefix='./'; Test unit written to ./crash-af8207aece6ab93d4889751950d782c3fac325e3 Step #5: Base64: LS0tLQ== Step #5: MERGE-OUTER: attempt 79 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 765988396 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/af8207aece6ab93d4889751950d782c3fac325e3' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 145 processed earlier; will process 157 files now Step #5: Running test ["env", "-vv", "-u=Y"] Step #5: === Compare result for: env ["-vv", "-u=Y"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =Y Step #5: env: cannot unset '=Y': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=Y Step #5: +env: cannot unset '=Y': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=Y"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv", "-u=AXv", "🔗🪛Ãt="] Step #5: === Compare result for: env ["-vv", "-u=AXv", "🔗🪛Ãt="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =AXv Step #5: env: cannot unset '=AXv': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=AXv Step #5: +env: cannot unset '=AXv': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=AXv", "🔗🪛Ãt="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=(BÃ", "H=8", "f=L🔗"] Step #5: === Compare result for: env ["-u=(BÃ", "H=8", "f=L🔗"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=(B\303\203': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=(B\303\203': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=(BÃ", "H=8", "f=L🔗"] Step #5: Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-u=U("] Step #5: === Compare result for: env ["-v", "-u=U("] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =U( Step #5: env: cannot unset '=U(': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=U( Step #5: +env: cannot unset '=U(': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=U("] Step #5: Step #5: Running test ["env", "9bF=", "5A2s=0I"] Step #5: === Compare result for: env ["9bF=", "5A2s=0I"] Step #5: Rust stdout: Step #5: 9bF= Step #5: 5A2s=0I Step #5: Step #5: GNU stdout: Step #5: 5A2s=0I Step #5: 9bF= Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +5A2s=0I Step #5: 9bF= Step #5: -5A2s=0I Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["9bF=", "5A2s=0I"] Step #5: Step #5: thread '' (7739) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["9bF=", "5A2s=0I"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7739== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2,0xff,0x0,0xff, Step #5: \002\377\000\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-3db69b3cdea92648ab5af1eb079525f22607cf21 Step #5: Base64: Av8A/w== Step #5: MERGE-OUTER: attempt 80 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766005861 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/3db69b3cdea92648ab5af1eb079525f22607cf21' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 151 processed earlier; will process 151 files now Step #5: Running test ["env", "-u=u"] Step #5: === Compare result for: env ["-u=u"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=u': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=u': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=u"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "uUi=rlp"] Step #5: === Compare result for: env ["uUi=rlp"] Step #5: Rust stdout: Step #5: uUi=rlp Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: uUi=rlp Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: uUi=rlp Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["uUi=rlp"] Step #5: Step #5: thread '' (7835) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["uUi=rlp"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7835== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x32,0x30,0x34,0x39, Step #5: 2049 Step #5: artifact_prefix='./'; Test unit written to ./crash-d1c382ecf779cee65f1396c723cf2a1aa2dc5b42 Step #5: Base64: MjA0OQ== Step #5: MERGE-OUTER: attempt 81 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766018154 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/d1c382ecf779cee65f1396c723cf2a1aa2dc5b42' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 154 processed earlier; will process 148 files now Step #5: Running test ["env", "-i", "Rwp5=", "Z=gJ"] Step #5: === Compare result for: env ["-i", "Rwp5=", "Z=gJ"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: Rwp5= Step #5: Z=gJ Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Rwp5= Step #5: Z=gJ Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: Rwp5= Step #5: Z=gJ Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (7899) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7899== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x2,0xa0,0x80, Step #5: 0\002\240\200 Step #5: artifact_prefix='./'; Test unit written to ./crash-5eb0e1bf4d19ebf849ab13e1f9ce767ef18c81f4 Step #5: Base64: MAKggA== Step #5: MERGE-OUTER: attempt 82 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766030294 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5eb0e1bf4d19ebf849ab13e1f9ce767ef18c81f4' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 156 processed earlier; will process 146 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (7952) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7952== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x10,0x2,0x5,0x0, Step #5: \020\002\005\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-56a199283db7b19a602718a47d60e83d4a3d55ae Step #5: Base64: EAIFAA== Step #5: MERGE-OUTER: attempt 83 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766041000 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/56a199283db7b19a602718a47d60e83d4a3d55ae' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 157 processed earlier; will process 145 files now Step #5: Running test ["env", "-i", "Ã=", "0="] Step #5: === Compare result for: env ["-i", "Ã=", "0="] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 31Mb Step #5: Running test ["env", "U(aS7=z\u{fe0f}", "k="] Step #5: === Compare result for: env ["U(aS7=z\u{fe0f}", "k="] Step #5: Rust stdout: Step #5: Ã= Step #5: 0= Step #5: U(aS7=z️ Step #5: k= Step #5: Step #5: GNU stdout: Step #5: 0= Step #5: LC_ALL=C Step #5: U(aS7=z️ Step #5: k= Step #5: Ã= Step #5: Step #5: --- START diff Step #5: -Ã= Step #5: 0= Step #5: +LC_ALL=C Step #5: U(aS7=z️ Step #5: k= Step #5: +Ã= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["U(aS7=z\u{fe0f}", "k="] Step #5: Step #5: thread '' (7990) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["U(aS7=z\u{fe0f}", "k="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==7990== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xf7,0xb2,0x8b,0x9a, Step #5: \367\262\213\232 Step #5: artifact_prefix='./'; Test unit written to ./crash-129be66559d84be783572dd01c165102ca9bf443 Step #5: Base64: 97KLmg== Step #5: MERGE-OUTER: attempt 84 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766054061 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/129be66559d84be783572dd01c165102ca9bf443' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 159 processed earlier; will process 143 files now Step #5: Running test ["env", "-v", "-u=a", "H9N=o"] Step #5: === Compare result for: env ["-v", "-u=a", "H9N=o"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =a Step #5: env: cannot unset '=a': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=a Step #5: +env: cannot unset '=a': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=a", "H9N=o"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-vv", "QÃl=C(7U0"] Step #5: === Compare result for: env ["-0", "-vv", "QÃl=C(7U0"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workQÃl=C(7U0 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64QÃl=C(7U0RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workQÃl=C(7U0 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64QÃl=C(7U0RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-vv' Step #5: arg[3]: 'QÃl=C(7U0' Step #5: GNU stderr: Step #5: QÃl=C(7U0 Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: 'QÃl=C(7U0' Step #5: +QÃl=C(7U0 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-vv", "QÃl=C(7U0"] Step #5: Step #5: thread '' (8038) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-vv", "QÃl=C(7U0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8038== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x31,0x63,0x26,0x26, Step #5: S1c&& Step #5: artifact_prefix='./'; Test unit written to ./crash-ed919f19622cbd5c8940680f69f83eacd35ee599 Step #5: Base64: UzFjJiY= Step #5: MERGE-OUTER: attempt 85 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766066064 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ed919f19622cbd5c8940680f69f83eacd35ee599' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 161 processed earlier; will process 141 files now Step #5: Running test ["env", "-v", "4=YkSfs"] Step #5: === Compare result for: env ["-v", "4=YkSfs"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 4=YkSfs Step #5: Step #5: GNU stdout: Step #5: 4=YkSfs Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +4=YkSfs Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -4=YkSfs Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 4=YkSfs Step #5: --- START diff Step #5: +4=YkSfs Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "4=YkSfs"] Step #5: Step #5: thread '' (8074) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "4=YkSfs"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8074== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x2,0x3,0x64,0xff,0xff, Step #5: \002\003d\377\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-c539602422eaee6a44cb9e92540630c514478a2f Step #5: Base64: AgNk//8= Step #5: MERGE-OUTER: attempt 86 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766078158 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c539602422eaee6a44cb9e92540630c514478a2f' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 162 processed earlier; will process 140 files now Step #5: Running test ["env", "-v", "-vv", "iib=d("] Step #5: === Compare result for: env ["-v", "-vv", "iib=d("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: iib=d( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: iib=d( Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: iib=d( Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: arg[3]: 'iib=d(' Step #5: GNU stderr: Step #5: iib=d( Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: 'iib=d(' Step #5: +iib=d( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "-vv", "iib=d("] Step #5: Step #5: thread '' (8117) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "-vv", "iib=d("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8117== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x3b,0x3b,0x3b,0x3b, Step #5: [;;;; Step #5: artifact_prefix='./'; Test unit written to ./crash-64a992f36ce77aacf7915531adba4a932966179b Step #5: Base64: Wzs7Ozs= Step #5: MERGE-OUTER: attempt 87 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766089299 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/64a992f36ce77aacf7915531adba4a932966179b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 163 processed earlier; will process 139 files now Step #5: Running test ["env", "-i", "-0", "=5🔗hs", "Dimx=DOU2"] Step #5: === Compare result for: env ["-i", "-0", "=5🔗hs", "Dimx=DOU2"] Step #5: Rust stdout: Step #5: Dimx=DOU2 Step #5: GNU stdout: Step #5: =5🔗hsDimx=DOU2 Step #5: --- START diff Step #5: -Dimx=DOU2 Step #5: +=5🔗hsDimx=DOU2 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "-0", "=5🔗hs", "Dimx=DOU2"] Step #5: Step #5: thread '' (8150) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-0", "=5🔗hs", "Dimx=DOU2"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8150== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x4,0x72,0xf0,0x74,0x65, Step #5: \004r\360te Step #5: artifact_prefix='./'; Test unit written to ./crash-8bfd9b5b5c5b31beca8a927f4cbe72eeea270a4f Step #5: Base64: BHLwdGU= Step #5: MERGE-OUTER: attempt 88 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766100394 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/8bfd9b5b5c5b31beca8a927f4cbe72eeea270a4f' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 164 processed earlier; will process 138 files now Step #5: Running test ["env", "-0"] Step #5: === Compare result for: env ["-0"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0"] Step #5: Step #5: thread '' (8187) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8187== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6,0x3,0x55,0x1d,0x48, Step #5: \006\003U\035H Step #5: artifact_prefix='./'; Test unit written to ./crash-ca3c16e77bd81ede0304663a8bb7a12d8b01380b Step #5: Base64: BgNVHUg= Step #5: MERGE-OUTER: attempt 89 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766110007 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ca3c16e77bd81ede0304663a8bb7a12d8b01380b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 165 processed earlier; will process 137 files now Step #5: Running test ["env", "-0", "-u=", "=🧰9(", "6xrV=(O"] Step #5: === Compare result for: env ["-0", "-u=", "=🧰9(", "6xrV=(O"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=", "=🧰9(", "6xrV=(O"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=m🔩i", "8⚙4=yM🧰", "=Az"] Step #5: === Compare result for: env ["-u=m🔩i", "8⚙4=yM🧰", "=Az"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=m\360\237\224\251i': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=m\360\237\224\251i': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=m🔩i", "8⚙4=yM🧰", "=Az"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8220) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8220== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x30,0x53,0x74,0x33, Step #5: S0St3 Step #5: artifact_prefix='./'; Test unit written to ./crash-9852744b268f36e3b0089d5675c228153f445fc6 Step #5: Base64: UzBTdDM= Step #5: MERGE-OUTER: attempt 90 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766123277 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/9852744b268f36e3b0089d5675c228153f445fc6' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 168 processed earlier; will process 134 files now Step #5: Running test ["env", "-i", "-0", "--chdir=/tmp", "\u{fe0f}0="] Step #5: === Compare result for: env ["-i", "-0", "--chdir=/tmp", "\u{fe0f}0="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "--chdir=/tmp", "\u{fe0f}0="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "4\u{fe0f}=H", "🧰GeZg=0fKIj"] Step #5: === Compare result for: env ["-v", "4\u{fe0f}=H", "🧰GeZg=0fKIj"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 4️=H Step #5: 🧰GeZg=0fKIj Step #5: Step #5: GNU stdout: Step #5: 4️=H Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🧰GeZg=0fKIj Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +4️=H Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -4️=H Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🧰GeZg=0fKIj Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: 4️=H Step #5: setenv: 🧰GeZg=0fKIj Step #5: --- START diff Step #5: +4️=H Step #5: +setenv: 🧰GeZg=0fKIj Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "4\u{fe0f}=H", "🧰GeZg=0fKIj"] Step #5: Step #5: thread '' (8273) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "4\u{fe0f}=H", "🧰GeZg=0fKIj"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8273== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x29,0x5d,0x2b,0x2f,0x76, Step #5: )]+/v Step #5: artifact_prefix='./'; Test unit written to ./crash-5ca4c53fbb3cb730f55fa86a6094e555610a9019 Step #5: Base64: KV0rL3Y= Step #5: MERGE-OUTER: attempt 91 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766136609 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5ca4c53fbb3cb730f55fa86a6094e555610a9019' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 170 processed earlier; will process 132 files now Step #5: Running test ["env", "Tz=TrJs"] Step #5: === Compare result for: env ["Tz=TrJs"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Tz=TrJs Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: Tz=TrJs Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: -WORK=/work Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: Tz=TrJs Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["Tz=TrJs"] Step #5: Step #5: thread '' (8318) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Tz=TrJs"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8318== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xfb,0xa0,0x81,0xaf,0x81, Step #5: \373\240\201\257\201 Step #5: artifact_prefix='./'; Test unit written to ./crash-adae8f0bcaf388822e9b4a8134ff2b20001dac42 Step #5: Base64: +6CBr4E= Step #5: MERGE-OUTER: attempt 92 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766147743 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/adae8f0bcaf388822e9b4a8134ff2b20001dac42' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 171 processed earlier; will process 131 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8352) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8352== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x4c,0x69,0x6b,0x5d, Step #5: [Lik] Step #5: artifact_prefix='./'; Test unit written to ./crash-2e67271cf8b6e3195fa6b3c897652123bae793e7 Step #5: Base64: W0xpa10= Step #5: MERGE-OUTER: attempt 93 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766159840 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2e67271cf8b6e3195fa6b3c897652123bae793e7' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 172 processed earlier; will process 130 files now Step #5: Running test ["env", "-u="] Step #5: === Compare result for: env ["-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "z🪓Fz=gBÃ🪓"] Step #5: === Compare result for: env ["z🪓Fz=gBÃ🪓"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: z🪓Fz=gBÃ🪓 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: z🪓Fz=gBÃ🪓 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: z🪓Fz=gBÃ🪓 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["z🪓Fz=gBÃ🪓"] Step #5: Step #5: thread '' (8385) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["z🪓Fz=gBÃ🪓"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8385== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xfb,0xbf,0xbf,0xbf,0xb0, Step #5: \373\277\277\277\260 Step #5: artifact_prefix='./'; Test unit written to ./crash-9df9d72232611793fe9266a852085da89b687823 Step #5: Base64: +7+/v7A= Step #5: MERGE-OUTER: attempt 94 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766173881 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/9df9d72232611793fe9266a852085da89b687823' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 175 processed earlier; will process 127 files now Step #5: Running test ["env", "-u=", "jÃm=vD"] Step #5: === Compare result for: env ["-u=", "jÃm=vD"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "jÃm=vD"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "-vv"] Step #5: === Compare result for: env ["-v", "-vv"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "-vv"] Step #5: Step #5: thread '' (8432) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8432== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x31,0x5a,0x6c,0x31, Step #5: S1Zl1 Step #5: artifact_prefix='./'; Test unit written to ./crash-52fe1431759ba551868ec3b2f341a333f56c5fab Step #5: Base64: UzFabDE= Step #5: MERGE-OUTER: attempt 95 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766186124 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/52fe1431759ba551868ec3b2f341a333f56c5fab' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 177 processed earlier; will process 125 files now Step #5: Running test ["env", "-u=YSyu", "--chdir=/tmp", "JN(5=ÃmFw", "X6="] Step #5: === Compare result for: env ["-u=YSyu", "--chdir=/tmp", "JN(5=ÃmFw", "X6="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=YSyu': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=YSyu': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=YSyu", "--chdir=/tmp", "JN(5=ÃmFw", "X6="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-u=(2", "=Ã", "0u2=("] Step #5: === Compare result for: env ["-v", "-u=(2", "=Ã", "0u2=("] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =(2 Step #5: env: cannot unset '=(2': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=(2 Step #5: +env: cannot unset '=(2': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=(2", "=Ã", "0u2=("] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "Vde=q9"] Step #5: === Compare result for: env ["Vde=q9"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Vde=q9 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: Vde=q9 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: -WORK=/work Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: Vde=q9 Step #5: +WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["Vde=q9"] Step #5: Step #5: thread '' (8476) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["Vde=q9"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8476== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xff,0x55,0x1d,0x3f,0xfa,0x0, Step #5: \377U\035?\372\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-c0bce7440839520245747e3db671489e613cb549 Step #5: Base64: /1UdP/oA Step #5: MERGE-OUTER: attempt 96 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766200546 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c0bce7440839520245747e3db671489e613cb549' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 180 processed earlier; will process 122 files now Step #5: Running test ["env", "-i", "--chdir=/tmp", "cg⚙ud=(", "=ÃDQ"] Step #5: === Compare result for: env ["-i", "--chdir=/tmp", "cg⚙ud=(", "=ÃDQ"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "--chdir=/tmp", "cg⚙ud=(", "=ÃDQ"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-vv", "=f2", "(e=6U"] Step #5: === Compare result for: env ["-v", "-vv", "=f2", "(e=6U"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: (e=6U Step #5: Step #5: GNU stdout: Step #5: (e=6U Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =f2 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(e=6U Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -(e=6U Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=f2 Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: arg[3]: '=f2' Step #5: arg[4]: '(e=6U' Step #5: fuzz_env: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =f2 Step #5: setenv: (e=6U Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: -arg[3]: '=f2' Step #5: -arg[4]: '(e=6U' Step #5: -fuzz_env: warning: env-warning-no-name-specified Step #5: +=f2 Step #5: +setenv: (e=6U Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "-vv", "=f2", "(e=6U"] Step #5: Step #5: thread '' (8522) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "-vv", "=f2", "(e=6U"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8522== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x22,0x5c,0x2f,0x22,0x5d, Step #5: [\"\\/\"] Step #5: artifact_prefix='./'; Test unit written to ./crash-60afec19bcadc74e0cc23b9d78b432434dc27524 Step #5: Base64: WyJcLyJd Step #5: MERGE-OUTER: attempt 97 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766213703 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/60afec19bcadc74e0cc23b9d78b432434dc27524' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 182 processed earlier; will process 120 files now Step #5: Running test ["env", "-0", "PNWo=bIÃt"] Step #5: === Compare result for: env ["-0", "PNWo=bIÃt"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workPNWo=bIÃt Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPNWo=bIÃtPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workPNWo=bIÃt Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPNWo=bIÃtPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "PNWo=bIÃt"] Step #5: Step #5: thread '' (8578) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "PNWo=bIÃt"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8578== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x2e,0x32,0x30,0x33,0x5d, Step #5: [.203] Step #5: artifact_prefix='./'; Test unit written to ./crash-c38a46b70fb7b6b99169ee1ede916227779ffe34 Step #5: Base64: Wy4yMDNd Step #5: MERGE-OUTER: attempt 98 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766224443 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c38a46b70fb7b6b99169ee1ede916227779ffe34' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 183 processed earlier; will process 119 files now Step #5: Running test ["env", "-0", "-v", "-vv", "--chdir=/tmp", "0X=X53w"] Step #5: === Compare result for: env ["-0", "-v", "-vv", "--chdir=/tmp", "0X=X53w"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-v' Step #5: arg[3]: '-vv' Step #5: arg[4]: '--chdir=/tmp' Step #5: arg[5]: '0X=X53w' Step #5: fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: 0X=X53w Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-v' Step #5: -arg[3]: '-vv' Step #5: -arg[4]: '--chdir=/tmp' Step #5: -arg[5]: '0X=X53w' Step #5: -fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +0X=X53w Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-v", "-vv", "--chdir=/tmp", "0X=X53w"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-u=ESÃ", "6Ã=t"] Step #5: === Compare result for: env ["-i", "-u=ESÃ", "6Ã=t"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: 6Ã=t Step #5: Step #5: --- START diff Step #5: +6Ã=t Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=ESÃ", "6Ã=t"] Step #5: Step #5: thread '' (8613) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=ESÃ", "6Ã=t"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8613== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x36,0x35,0x35,0x33,0x36,0x33, Step #5: 655363 Step #5: artifact_prefix='./'; Test unit written to ./crash-2c25436f3090294a3f5df755e989de6e89062a8b Step #5: Base64: NjU1MzYz Step #5: MERGE-OUTER: attempt 99 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766235630 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/2c25436f3090294a3f5df755e989de6e89062a8b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 185 processed earlier; will process 117 files now Step #5: Running test ["env", "-0", "-vv"] Step #5: === Compare result for: env ["-0", "-vv"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-vv"] Step #5: Step #5: thread '' (8651) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8651== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x1,0x7a,0x3b,0x1, Step #5: \000\000\001z;\001 Step #5: artifact_prefix='./'; Test unit written to ./crash-7736c8f99f034ddf95514a675b167dd65f7d666e Step #5: Base64: AAABejsB Step #5: MERGE-OUTER: attempt 100 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766245585 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/7736c8f99f034ddf95514a675b167dd65f7d666e' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 186 processed earlier; will process 116 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8683) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8683== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6,0x5,0x2b,0x81,0x4,0x0,0x3, Step #5: \006\005+\201\004\000\003 Step #5: artifact_prefix='./'; Test unit written to ./crash-0963ecb2fc3979996b4cc90f1e15387875de6876 Step #5: Base64: BgUrgQQAAw== Step #5: MERGE-OUTER: attempt 101 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766258032 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/0963ecb2fc3979996b4cc90f1e15387875de6876' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 187 processed earlier; will process 115 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8734) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8734== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x29,0x5d,0x7d,0x27,0xff,0xff,0x37, Step #5: )]}'\377\3777 Step #5: artifact_prefix='./'; Test unit written to ./crash-40a31f1a2c59262d6b988561c1463e3f6aa09941 Step #5: Base64: KV19J///Nw== Step #5: MERGE-OUTER: attempt 102 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766269958 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/40a31f1a2c59262d6b988561c1463e3f6aa09941' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 188 processed earlier; will process 114 files now Step #5: Running test ["env", "-vv", "--chdir=/tmp"] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=⚙"] Step #5: === Compare result for: env ["-u=⚙"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\342\232\231': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\342\232\231': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=⚙"] Step #5: Step #5: Running test ["env", "-v", "-vv"] Step #5: === Compare result for: env ["-v", "-vv"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-v' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-v' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "-vv"] Step #5: Step #5: thread '' (8783) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8783== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3f,0x87,0xff,0xff,0xff,0x7e,0x0, Step #5: ?\207\377\377\377~\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-4b07480cfd57ca373f6422cc022afb033a83be49 Step #5: Base64: P4f///9+AA== Step #5: MERGE-OUTER: attempt 103 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766284638 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/4b07480cfd57ca373f6422cc022afb033a83be49' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 192 processed earlier; will process 110 files now Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (8832) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8832== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x30,0x5d,0x42,0x4f,0x4f,0x4c, Step #5: S0]BOOL Step #5: artifact_prefix='./'; Test unit written to ./crash-8f2bb01b31644953ade34f6c58643ea248ead57c Step #5: Base64: UzBdQk9PTA== Step #5: MERGE-OUTER: attempt 104 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766296316 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/8f2bb01b31644953ade34f6c58643ea248ead57c' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 193 processed earlier; will process 109 files now Step #5: Running test ["env", "-0", "Ãno=\u{fe0f}mv2🪓"] Step #5: === Compare result for: env ["-0", "Ãno=\u{fe0f}mv2🪓"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workÃno=️mv2🪓 Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEÃno=️mv2🪓 Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workÃno=️mv2🪓 Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCEÃno=️mv2🪓 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "Ãno=\u{fe0f}mv2🪓"] Step #5: Step #5: thread '' (8859) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "Ãno=\u{fe0f}mv2🪓"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8859== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x6,0x2,0x4,0x42,0x2b,0x6,0xfd, Step #5: 0\006\002\004B+\006\375 Step #5: artifact_prefix='./'; Test unit written to ./crash-c67571439c1b805a68449f258b598692b547865b Step #5: Base64: MAYCBEIrBv0= Step #5: MERGE-OUTER: attempt 105 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766307734 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c67571439c1b805a68449f258b598692b547865b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 194 processed earlier; will process 108 files now Step #5: Running test ["env", "-u=O", "--chdir=/tmp"] Step #5: === Compare result for: env ["-u=O", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=O': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=O': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=O", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "-u="] Step #5: === Compare result for: env ["-v", "-u="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: = Step #5: env: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: += Step #5: +env: cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (8897) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8897== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x27,0x5c,0x75,0x41,0xde,0xde,0x7a,0x41, Step #5: '\\uA\336\336zA Step #5: artifact_prefix='./'; Test unit written to ./crash-682f4a768e45b0d7897e7cc98baeebe37afaaa70 Step #5: Base64: J1x1Qd7eekE= Step #5: MERGE-OUTER: attempt 106 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766321491 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/682f4a768e45b0d7897e7cc98baeebe37afaaa70' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 197 processed earlier; will process 105 files now Step #5: Running test ["env", "-0", "-v", "-vv", "--chdir=/tmp", "(ÃK(N=sWÃ(7", "h(K=w8Q"] Step #5: === Compare result for: env ["-0", "-v", "-vv", "--chdir=/tmp", "(ÃK(N=sWÃ(7", "h(K=w8Q"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-0' Step #5: arg[2]: '-v' Step #5: arg[3]: '-vv' Step #5: arg[4]: '--chdir=/tmp' Step #5: arg[5]: '(ÃK(N=sWÃ(7' Step #5: arg[6]: 'h(K=w8Q' Step #5: fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: (ÃK(N=sWÃ(7 Step #5: setenv: h(K=w8Q Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-0' Step #5: -arg[2]: '-v' Step #5: -arg[3]: '-vv' Step #5: -arg[4]: '--chdir=/tmp' Step #5: -arg[5]: '(ÃK(N=sWÃ(7' Step #5: -arg[6]: 'h(K=w8Q' Step #5: -fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +(ÃK(N=sWÃ(7 Step #5: +setenv: h(K=w8Q Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-v", "-vv", "--chdir=/tmp", "(ÃK(N=sWÃ(7", "h(K=w8Q"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-vv", "-u=2SeJ🔩", "--chdir=/tmp", "vtÃs="] Step #5: === Compare result for: env ["-vv", "-u=2SeJ🔩", "--chdir=/tmp", "vtÃs="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =2SeJ🔩 Step #5: env: cannot unset '=2SeJ\360\237\224\251': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=2SeJ🔩 Step #5: +env: cannot unset '=2SeJ\360\237\224\251': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=2SeJ🔩", "--chdir=/tmp", "vtÃs="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: Running test ["env", "-v", "-u=rW4(T", "kpÃn8=Phd"] Step #5: === Compare result for: env ["-v", "-u=rW4(T", "kpÃn8=Phd"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =rW4(T Step #5: env: cannot unset '=rW4(T': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=rW4(T Step #5: +env: cannot unset '=rW4(T': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=rW4(T", "kpÃn8=Phd"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "--chdir=/tmp", "5=dW", "v="] Step #5: === Compare result for: env ["-v", "--chdir=/tmp", "5=dW", "v="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: 5=dW Step #5: setenv: v= Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +5=dW Step #5: +setenv: v= Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "--chdir=/tmp", "5=dW", "v="] Step #5: Step #5: Running test ["env", "-0", "-u=ÃFL9", "ISLt=ÃgdEn"] Step #5: === Compare result for: env ["-0", "-u=ÃFL9", "ISLt=ÃgdEn"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\303\203FL9': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\303\203FL9': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=ÃFL9", "ISLt=ÃgdEn"] Step #5: Step #5: Running test ["env", "-v", "-u=AdZ"] Step #5: === Compare result for: env ["-v", "-u=AdZ"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =AdZ Step #5: env: cannot unset '=AdZ': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=AdZ Step #5: +env: cannot unset '=AdZ': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=AdZ"] Step #5: Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8947) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8947== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x38,0x30,0x35,0x33,0x30,0x36,0x33,0x36,0x38, Step #5: 805306368 Step #5: artifact_prefix='./'; Test unit written to ./crash-778172ba050a9520f35261c1f32a7ee24045e677 Step #5: Base64: ODA1MzA2MzY4 Step #5: MERGE-OUTER: attempt 107 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766347413 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/778172ba050a9520f35261c1f32a7ee24045e677' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 205 processed earlier; will process 97 files now Step #5: Running test ["env", "--chdir=/tmp", "=EY", "🔩(\u{fe0f}=ÃtPhZ"] Step #5: === Compare result for: env ["--chdir=/tmp", "=EY", "🔩(\u{fe0f}=ÃtPhZ"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "=EY", "🔩(\u{fe0f}=ÃtPhZ"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "--chdir=/tmp", "Ã=hK", "tFNAo=9MkH"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "Ã=hK", "tFNAo=9MkH"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "Ã=hK", "tFNAo=9MkH"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-0", "-v", "-vv", "srqo=🧰5🔩m"] Step #5: === Compare result for: env ["-i", "-0", "-v", "-vv", "srqo=🧰5🔩m"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-0' Step #5: arg[3]: '-v' Step #5: arg[4]: '-vv' Step #5: arg[5]: 'srqo=🧰5🔩m' Step #5: GNU stderr: Step #5: srqo=🧰5🔩m Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-0' Step #5: -arg[3]: '-v' Step #5: -arg[4]: '-vv' Step #5: -arg[5]: 'srqo=🧰5🔩m' Step #5: +srqo=🧰5🔩m Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "-v", "-vv", "srqo=🧰5🔩m"] Step #5: Step #5: Running test ["env", "-u=M", "wBBs=aL7", "0(s=bTÃcl"] Step #5: === Compare result for: env ["-u=M", "wBBs=aL7", "0(s=bTÃcl"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=M': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=M': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=M", "wBBs=aL7", "0(s=bTÃcl"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: srqo=🧰5🔩m Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: srqo=🧰5🔩m Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: srqo=🧰5🔩m Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (8999) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==8999== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x31,0x5d,0x63,0x6c,0x61,0x73,0x73,0xa,0x73, Step #5: S1]class\012s Step #5: artifact_prefix='./'; Test unit written to ./crash-13d1460907fae43f070254df1e6252b304b3a860 Step #5: Base64: UzFdY2xhc3MKcw== Step #5: MERGE-OUTER: attempt 108 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766366724 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/13d1460907fae43f070254df1e6252b304b3a860' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 210 processed earlier; will process 92 files now Step #5: Running test ["env", "-u=w", "Ã=O"] Step #5: === Compare result for: env ["-u=w", "Ã=O"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=w': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=w': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=w", "Ã=O"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "vbv=7q4WN", "T🪛=2"] Step #5: === Compare result for: env ["vbv=7q4WN", "T🪛=2"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: vbv=7q4WN Step #5: T🪛=2 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: T🪛=2 Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: vbv=7q4WN Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +T🪛=2 Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: vbv=7q4WN Step #5: -T🪛=2 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["vbv=7q4WN", "T🪛=2"] Step #5: Step #5: thread '' (9036) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["vbv=7q4WN", "T🪛=2"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9036== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xa7,0x61,0xfc,0x3,0x61,0xfc,0x3,0x1,0x50,0x1, Step #5: \247a\374\003a\374\003\001P\001 Step #5: artifact_prefix='./'; Test unit written to ./crash-fddb3955392cecb936628b33e623175cd92223aa Step #5: Base64: p2H8A2H8AwFQAQ== Step #5: MERGE-OUTER: attempt 109 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766380375 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/fddb3955392cecb936628b33e623175cd92223aa' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 212 processed earlier; will process 90 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9061) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9061== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x8,0xa7,0x0,0xa3,0x0,0xa3,0x80,0x0,0x0, Step #5: 0\010\247\000\243\000\243\200\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-238f1b83b0874ed5c03ed28786234a56dd19e24b Step #5: Base64: MAinAKMAo4AAAA== Step #5: MERGE-OUTER: attempt 110 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766394337 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/238f1b83b0874ed5c03ed28786234a56dd19e24b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 214 processed earlier; will process 88 files now Step #5: Running test ["env", "-0"] Step #5: === Compare result for: env ["-0"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0"] Step #5: Step #5: thread '' (9086) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9086== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7b,0x38,0x3d,0x7b,0x3,0x3d,0x7b,0x0,0x3d,0x7b, Step #5: {8={\003={\000={ Step #5: artifact_prefix='./'; Test unit written to ./crash-aa5e23b805124c7c4388ce881b378f7a72ea7ba3 Step #5: Base64: ezg9ewM9ewA9ew== Step #5: MERGE-OUTER: attempt 111 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766405052 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/aa5e23b805124c7c4388ce881b378f7a72ea7ba3' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 215 processed earlier; will process 87 files now Step #5: Running test ["env", "-u=", "2N9=", "🔩Kl=🪛u🧰🔩"] Step #5: === Compare result for: env ["-u=", "2N9=", "🔩Kl=🪛u🧰🔩"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=", "2N9=", "🔩Kl=🪛u🧰🔩"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "⚙🪛3ho="] Step #5: === Compare result for: env ["⚙🪛3ho="] Step #5: Rust stdout: Step #5: ⚙🪛3ho= Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: ⚙🪛3ho= Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: ⚙🪛3ho= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["⚙🪛3ho="] Step #5: Step #5: thread '' (9107) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["⚙🪛3ho="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9107== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6c,0x78,0x63,0x2e,0x73,0x79,0x73,0x63,0x74,0x6c,0x65,0x3d, Step #5: lxc.sysctle= Step #5: artifact_prefix='./'; Test unit written to ./crash-045b254f12d278f16d480616a6a12d87ae56f0a0 Step #5: Base64: bHhjLnN5c2N0bGU9 Step #5: MERGE-OUTER: attempt 112 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766418382 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/045b254f12d278f16d480616a6a12d87ae56f0a0' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 218 processed earlier; will process 84 files now Step #5: Running test ["env", "-vv", "-u=x", "--chdir=/tmp", "YH=IGx", "Z7Ddv=uE🔗"] Step #5: === Compare result for: env ["-vv", "-u=x", "--chdir=/tmp", "YH=IGx", "Z7Ddv=uE🔗"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =x Step #5: env: cannot unset '=x': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=x Step #5: +env: cannot unset '=x': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "-u=x", "--chdir=/tmp", "YH=IGx", "Z7Ddv=uE🔗"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-u=l2(", "--chdir=/tmp"] Step #5: === Compare result for: env ["-u=l2(", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=l2(': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=l2(': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=l2(", "--chdir=/tmp"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-u=c(O", "--chdir=/tmp", "i\u{fe0f}Ãy=", "=🧰"] Step #5: === Compare result for: env ["-i", "-u=c(O", "--chdir=/tmp", "i\u{fe0f}Ãy=", "=🧰"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-u=c(O", "--chdir=/tmp", "i\u{fe0f}Ãy=", "=🧰"] Step #5: Step #5: Running test ["env", "-0", "-u=ZqJv(l", "T="] Step #5: === Compare result for: env ["-0", "-u=ZqJv(l", "T="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=ZqJv(l': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=ZqJv(l': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=ZqJv(l", "T="] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "PW🔩=E(dQ", "MJav="] Step #5: === Compare result for: env ["PW🔩=E(dQ", "MJav="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: PW🔩=E(dQ Step #5: MJav= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MJav= Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PW🔩=E(dQ Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: +COVERAGE_EXTRA_ARGS= Step #5: +DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: -DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MJav= Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +PW🔩=E(dQ Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -PW🔩=E(dQ Step #5: -MJav= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["PW🔩=E(dQ", "MJav="] Step #5: Step #5: thread '' (9136) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["PW🔩=E(dQ", "MJav="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9136== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xfe,0xfe,0x0,0x0,0x0,0xfe,0xfe,0xb9,0xff,0xfe,0xfe,0x0,0x0, Step #5: \376\376\000\000\000\376\376\271\377\376\376\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-add385ea51b77c98daa935c1287bc4daf23d8795 Step #5: Base64: /v4AAAD+/rn//v4AAA== Step #5: MERGE-OUTER: attempt 113 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766436121 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/add385ea51b77c98daa935c1287bc4daf23d8795' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 223 processed earlier; will process 79 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "🪓9Ãd=Za0A(", "8(3V=X"] Step #5: === Compare result for: env ["🪓9Ãd=Za0A(", "8(3V=X"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 🪓9Ãd=Za0A( Step #5: 8(3V=X Step #5: Step #5: GNU stdout: Step #5: 8(3V=X Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🪓9Ãd=Za0A( Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +8(3V=X Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: 🪓9Ãd=Za0A( Step #5: -8(3V=X Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["🪓9Ãd=Za0A(", "8(3V=X"] Step #5: Step #5: thread '' (9178) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["🪓9Ãd=Za0A(", "8(3V=X"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9178== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x49,0x44,0x33,0x2,0x41,0x0,0x7f,0x7f,0x7f,0x7f,0x7f,0xc3,0x66, Step #5: ID3\002A\000\177\177\177\177\177\303f Step #5: artifact_prefix='./'; Test unit written to ./crash-202a71f04a541a499bf7d991a4a1a5036924a9d0 Step #5: Base64: SUQzAkEAf39/f3/DZg== Step #5: MERGE-OUTER: attempt 114 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766450532 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/202a71f04a541a499bf7d991a4a1a5036924a9d0' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 225 processed earlier; will process 77 files now Step #5: Running test ["env", "--chdir=/tmp", "m0Zv=LmN"] Step #5: === Compare result for: env ["--chdir=/tmp", "m0Zv=LmN"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "m0Zv=LmN"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-0", "--chdir=/tmp", "zwp=(pNW", "y(D="] Step #5: === Compare result for: env ["-i", "-0", "--chdir=/tmp", "zwp=(pNW", "y(D="] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "--chdir=/tmp", "zwp=(pNW", "y(D="] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-u=(W84QP", "--chdir=/tmp", "=sKSu", "🧰U=🪛IC("] Step #5: === Compare result for: env ["-0", "-u=(W84QP", "--chdir=/tmp", "=sKSu", "🧰U=🪛IC("] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=(W84QP': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=(W84QP': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=(W84QP", "--chdir=/tmp", "=sKSu", "🧰U=🪛IC("] Step #5: Step #5: Running test ["env", "-i", "-u=1H🔗ip"] Step #5: === Compare result for: env ["-i", "-u=1H🔗ip"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=1H🔗ip"] Step #5: Step #5: thread '' (9220) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=1H🔗ip"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9220== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x15,0x16,0x2,0x0,0x2,0x0,0xa,0x15,0x16,0x2,0x0,0x2,0x0,0xa, Step #5: \025\026\002\000\002\000\012\025\026\002\000\002\000\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-d4e7fadc43b64895179ad7fa3a49c288f41ebe81 Step #5: Base64: FRYCAAIAChUWAgACAAo= Step #5: MERGE-OUTER: attempt 115 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766466685 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/d4e7fadc43b64895179ad7fa3a49c288f41ebe81' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 229 processed earlier; will process 73 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9270) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9270== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x49,0x44,0x33,0x3,0x0,0x0,0x0,0x2,0x0,0x67,0x47,0x54,0x31,0xff, Step #5: ID3\003\000\000\000\002\000gGT1\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-e6031c7fda54fbc1b3f1bbad1d277b950b551841 Step #5: Base64: SUQzAwAAAAIAZ0dUMf8= Step #5: MERGE-OUTER: attempt 116 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766477855 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e6031c7fda54fbc1b3f1bbad1d277b950b551841' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 230 processed earlier; will process 72 files now Step #5: Running test ["env", "-i", "-0", "-v", "-vv", "-u=oRCQPN", "--chdir=/tmp", "C=🔗f6", "5=CSSBu"] Step #5: === Compare result for: env ["-i", "-0", "-v", "-vv", "-u=oRCQPN", "--chdir=/tmp", "C=🔗f6", "5=CSSBu"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: C=🔗f6 Step #5: setenv: 5=CSSBu Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +C=🔗f6 Step #5: +setenv: 5=CSSBu Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "-v", "-vv", "-u=oRCQPN", "--chdir=/tmp", "C=🔗f6", "5=CSSBu"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "--chdir=/tmp", "AD=pF6r🪓"] Step #5: === Compare result for: env ["-0", "--chdir=/tmp", "AD=pF6r🪓"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "--chdir=/tmp", "AD=pF6r🪓"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "(Ãs7q=N", "="] Step #5: === Compare result for: env ["-v", "(Ãs7q=N", "="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: (Ãs7q=N Step #5: Step #5: GNU stdout: Step #5: (Ãs7q=N Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: = Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(Ãs7q=N Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -(Ãs7q=N Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (Ãs7q=N Step #5: setenv: = Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +(Ãs7q=N Step #5: +setenv: = Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "(Ãs7q=N", "="] Step #5: Step #5: thread '' (9289) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "(Ãs7q=N", "="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9289== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6c,0x78,0x63,0x2e,0x6c,0x6f,0x67,0x2e,0x6c,0x65,0x76,0x65,0x6c,0x3d,0x8c, Step #5: lxc.log.level=\214 Step #5: artifact_prefix='./'; Test unit written to ./crash-ca409404f527b3ef95bd42b368ec0ba7c0ab485f Step #5: Base64: bHhjLmxvZy5sZXZlbD2M Step #5: MERGE-OUTER: attempt 117 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766491540 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/ca409404f527b3ef95bd42b368ec0ba7c0ab485f' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 233 processed earlier; will process 69 files now Step #5: Running test ["env", "=", "aHJD="] Step #5: === Compare result for: env ["=", "aHJD="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: aHJD= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aHJD= Step #5: = Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aHJD= Step #5: += Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["=", "aHJD="] Step #5: Step #5: thread '' (9318) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["=", "aHJD="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9318== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x49,0x44,0x33,0x2,0x0,0x1b,0x40,0x2,0x6d,0x49,0x43,0x48,0x41,0x0,0x0,0x16, Step #5: ID3\002\000\033@\002mICHA\000\000\026 Step #5: artifact_prefix='./'; Test unit written to ./crash-b295c58dba13bc171a8b76cbeed41078d169acb9 Step #5: Base64: SUQzAgAbQAJtSUNIQQAAFg== Step #5: MERGE-OUTER: attempt 118 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766501613 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b295c58dba13bc171a8b76cbeed41078d169acb9' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 234 processed earlier; will process 68 files now Step #5: Running test ["env", "\u{fe0f}l=UA", "BV=8BDwÃ"] Step #5: === Compare result for: env ["\u{fe0f}l=UA", "BV=8BDwÃ"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: ️l=UA Step #5: BV=8BDwà Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: BV=8BDwà Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ️l=UA Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: +BV=8BDwà Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: ️l=UA Step #5: -BV=8BDwà Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["\u{fe0f}l=UA", "BV=8BDwÃ"] Step #5: Step #5: thread '' (9336) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["\u{fe0f}l=UA", "BV=8BDwÃ"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9336== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6c,0x78,0x63,0x2e,0x6e,0x65,0x74,0x77,0x6f,0x72,0x6b,0x2e,0x68,0x77,0x61,0x6b, Step #5: lxc.network.hwak Step #5: artifact_prefix='./'; Test unit written to ./crash-c8484bcf9f4424f77d8471d68fa3654da2aaaa42 Step #5: Base64: bHhjLm5ldHdvcmsuaHdhaw== Step #5: MERGE-OUTER: attempt 119 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766511902 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c8484bcf9f4424f77d8471d68fa3654da2aaaa42' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 235 processed earlier; will process 67 files now Step #5: Running test ["env", "z8=cLObB", "ÃxÃD=zÃL7"] Step #5: === Compare result for: env ["z8=cLObB", "ÃxÃD=zÃL7"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: z8=cLObB Step #5: ÃxÃD=zÃL7 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: z8=cLObB Step #5: ÃxÃD=zÃL7 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: z8=cLObB Step #5: ÃxÃD=zÃL7 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["z8=cLObB", "ÃxÃD=zÃL7"] Step #5: Step #5: thread '' (9351) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["z8=cLObB", "ÃxÃD=zÃL7"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9351== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x49,0x44,0x33,0x2,0xf2,0x0,0xa,0x0,0x2,0x0,0x43,0x48,0x41,0x0,0x0,0xf, Step #5: ID3\002\362\000\012\000\002\000CHA\000\000\017 Step #5: artifact_prefix='./'; Test unit written to ./crash-c4dbe5e37a1af1e397cdafa56d29c907184c39cb Step #5: Base64: SUQzAvIACgACAENIQQAADw== Step #5: MERGE-OUTER: attempt 120 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766523310 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c4dbe5e37a1af1e397cdafa56d29c907184c39cb' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 236 processed earlier; will process 66 files now Step #5: Running test ["env", "-v", "=Sx(l"] Step #5: === Compare result for: env ["-v", "=Sx(l"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: =Sx(l Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +=Sx(l Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =Sx(l Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=Sx(l Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=Sx(l"] Step #5: Step #5: thread '' (9365) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=Sx(l"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9365== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x54,0x52,0x55,0x45,0x32,0x20,0x54,0x52,0x55,0x45,0x52,0x20,0x54,0x52,0x55,0x45,0x45, Step #5: TRUE2 TRUER TRUEE Step #5: artifact_prefix='./'; Test unit written to ./crash-1ee15a91a84816de9bd3d55d6b336eb72f19010d Step #5: Base64: VFJVRTIgVFJVRVIgVFJVRUU= Step #5: MERGE-OUTER: attempt 121 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766533617 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1ee15a91a84816de9bd3d55d6b336eb72f19010d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 237 processed earlier; will process 65 files now Step #5: Running test ["env", "-u=aEsR", "--chdir=/tmp", "g=09R\u{fe0f}", "de=BKOP7"] Step #5: === Compare result for: env ["-u=aEsR", "--chdir=/tmp", "g=09R\u{fe0f}", "de=BKOP7"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=aEsR': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=aEsR': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=aEsR", "--chdir=/tmp", "g=09R\u{fe0f}", "de=BKOP7"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "RNtEY=ÃchF"] Step #5: === Compare result for: env ["-i", "RNtEY=ÃchF"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "abBy=V\u{fe0f}(", "U=Af"] Step #5: === Compare result for: env ["abBy=V\u{fe0f}(", "U=Af"] Step #5: Rust stdout: Step #5: RNtEY=ÃchF Step #5: abBy=V️( Step #5: U=Af Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: RNtEY=ÃchF Step #5: U=Af Step #5: abBy=V️( Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: RNtEY=ÃchF Step #5: -abBy=V️( Step #5: U=Af Step #5: +abBy=V️( Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["abBy=V\u{fe0f}(", "U=Af"] Step #5: Step #5: thread '' (9371) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["abBy=V\u{fe0f}(", "U=Af"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9371== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6c,0x78,0x63,0x2e,0x6e,0x65,0x74,0x2e,0x39,0x32,0x32,0x33,0x33,0x37,0x32,0x37,0x3d,0x29, Step #5: lxc.net.92233727=) Step #5: artifact_prefix='./'; Test unit written to ./crash-92326966b7923d8784d1456d9fa622b8b8104cc5 Step #5: Base64: bHhjLm5ldC45MjIzMzcyNz0p Step #5: MERGE-OUTER: attempt 122 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766544832 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/92326966b7923d8784d1456d9fa622b8b8104cc5' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 240 processed earlier; will process 62 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-vv"] Step #5: === Compare result for: env ["-vv"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv"] Step #5: Step #5: thread '' (9384) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9384== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x2,0x0,0x32,0x0,0xdf,0xdf,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x0, Step #5: \000\000\002\0002\000\337\337\377\377\377\377\377\377\377\377\377\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-4cd3d662b89cebe2986429c6df61ed2cc0691fc5 Step #5: Base64: AAACADIA39////////////8A Step #5: MERGE-OUTER: attempt 123 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766557101 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/4cd3d662b89cebe2986429c6df61ed2cc0691fc5' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 242 processed earlier; will process 60 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9395) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9395== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6c,0x78,0x63,0x2e,0x6c,0x6f,0x67,0x2e,0x6c,0x65,0x76,0x65,0x6c,0x3d,0x4e,0x4f,0x54,0xcd, Step #5: lxc.log.level=NOT\315 Step #5: artifact_prefix='./'; Test unit written to ./crash-5e1f719479b7b47afa2e7f8f382151b7b1b3e55b Step #5: Base64: bHhjLmxvZy5sZXZlbD1OT1TN Step #5: MERGE-OUTER: attempt 124 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766567533 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/5e1f719479b7b47afa2e7f8f382151b7b1b3e55b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 243 processed earlier; will process 59 files now Step #5: Running test ["env", "-u=3d9A", "=usÃS"] Step #5: === Compare result for: env ["-u=3d9A", "=usÃS"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=3d9A': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=3d9A': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=3d9A", "=usÃS"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=O"] Step #5: === Compare result for: env ["-u=O"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=O': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=O': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=O"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "Rk=TtÃJ2", "XUQz=WIq"] Step #5: === Compare result for: env ["-0", "Rk=TtÃJ2", "XUQz=WIq"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workRk=TtÃJ2XUQz=WIq Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773Rk=TtÃJ2SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/workXUQz=WIq_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workRk=TtÃJ2XUQz=WIq Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773Rk=TtÃJ2SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/workXUQz=WIq_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "Rk=TtÃJ2", "XUQz=WIq"] Step #5: Step #5: thread '' (9401) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "Rk=TtÃJ2", "XUQz=WIq"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9401== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x20,0x93,0x20,0x2d,0x32,0x31,0x34,0x38,0x34,0x38,0x33,0x36,0x35,0x30,0x20,0x3a,0x20,0x3b, Step #5: 0 \223 -2148483650 : ; Step #5: artifact_prefix='./'; Test unit written to ./crash-58716adbef24b8f955874b65bc00727a19066ddf Step #5: Base64: MCCTIC0yMTQ4NDgzNjUwIDogOw== Step #5: MERGE-OUTER: attempt 125 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766579348 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/58716adbef24b8f955874b65bc00727a19066ddf' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 246 processed earlier; will process 56 files now Step #5: Running test ["env", "z=NE3", "fÃ🔗=Qw🪓"] Step #5: === Compare result for: env ["z=NE3", "fÃ🔗=Qw🪓"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: z=NE3 Step #5: fÃ🔗=Qw🪓 Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: fÃ🔗=Qw🪓 Step #5: z=NE3 Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -z=NE3 Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: fÃ🔗=Qw🪓 Step #5: +z=NE3 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["z=NE3", "fÃ🔗=Qw🪓"] Step #5: Step #5: thread '' (9413) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["z=NE3", "fÃ🔗=Qw🪓"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9413== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x80,0x30,0x7,0x3f,0x87,0xff,0xff,0xff,0x65,0x0,0x30,0x3,0x6,0x1,0x0,0x3,0x1,0x4, Step #5: 0\2000\007?\207\377\377\377e\0000\003\006\001\000\003\001\004 Step #5: artifact_prefix='./'; Test unit written to ./crash-9a915f36c32c25cc94ff76206b5dc8d9675acdde Step #5: Base64: MIAwBz+H////ZQAwAwYBAAMBBA== Step #5: MERGE-OUTER: attempt 126 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766590209 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/9a915f36c32c25cc94ff76206b5dc8d9675acdde' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 247 processed earlier; will process 55 files now Step #5: Running test ["env", "-i", "-0", "=ng🔩", "Ã5(=m"] Step #5: === Compare result for: env ["-i", "-0", "=ng🔩", "Ã5(=m"] Step #5: Rust stdout: Step #5: Ã5(=m Step #5: GNU stdout: Step #5: =ng🔩Ã5(=m Step #5: --- START diff Step #5: -Ã5(=m Step #5: +=ng🔩Ã5(=m Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-i", "-0", "=ng🔩", "Ã5(=m"] Step #5: Step #5: thread '' (9419) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-0", "=ng🔩", "Ã5(=m"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9419== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x4d,0x61,0x74,0x63,0x68,0x5d,0xa,0x56,0x65,0x72,0x73,0x69,0x6f,0x6e,0x3d,0x3e,0x36,0x3e,0x36, Step #5: [Match]\012Version=>6>6 Step #5: artifact_prefix='./'; Test unit written to ./crash-cd77ca375d144422c7efe0e64d8c1a29fa83a5c1 Step #5: Base64: W01hdGNoXQpWZXJzaW9uPT42PjY= Step #5: MERGE-OUTER: attempt 127 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766601269 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/cd77ca375d144422c7efe0e64d8c1a29fa83a5c1' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 248 processed earlier; will process 54 files now Step #5: Running test ["env", "--chdir=/tmp", "🪓tN🪛(=⚙"] Step #5: === Compare result for: env ["--chdir=/tmp", "🪓tN🪛(=⚙"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "🪓tN🪛(=⚙"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "Q9=", "🔗V=t7"] Step #5: === Compare result for: env ["-i", "Q9=", "🔗V=t7"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "--chdir=/tmp", "B=qÃqwi"] Step #5: === Compare result for: env ["-i", "--chdir=/tmp", "B=qÃqwi"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "--chdir=/tmp", "B=qÃqwi"] Step #5: Step #5: Running test ["env", "--chdir=/tmp", "Ã=eÃO4"] Step #5: === Compare result for: env ["--chdir=/tmp", "Ã=eÃO4"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "Ã=eÃO4"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "WKlS7=2JGD"] Step #5: === Compare result for: env ["WKlS7=2JGD"] Step #5: Rust stdout: Step #5: Q9= Step #5: 🔗V=t7 Step #5: WKlS7=2JGD Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Q9= Step #5: WKlS7=2JGD Step #5: 🔗V=t7 Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: Q9= Step #5: -🔗V=t7 Step #5: WKlS7=2JGD Step #5: +🔗V=t7 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["WKlS7=2JGD"] Step #5: Step #5: thread '' (9428) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["WKlS7=2JGD"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9428== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x2,0x0,0x1,0x0,0xfe,0xf7,0xc0,0x30,0x0,0x0,0xff,0x22,0x10,0x0,0x0,0x0,0x0,0x29,0x3,0xff, Step #5: \000\000\002\000\001\000\376\367\3000\000\000\377\"\020\000\000\000\000)\003\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-1e8810534c1e26eba56641597ede42f7ef097f64 Step #5: Base64: AAACAAEA/vfAMAAA/yIQAAAAACkD/w== Step #5: MERGE-OUTER: attempt 128 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766617773 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1e8810534c1e26eba56641597ede42f7ef097f64' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 253 processed earlier; will process 49 files now Step #5: Running test ["env", "-i", "-u=", "74M\u{fe0f}a=V"] Step #5: === Compare result for: env ["-i", "-u=", "74M\u{fe0f}a=V"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: 74M️a=V Step #5: Step #5: --- START diff Step #5: +74M️a=V Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=", "74M\u{fe0f}a=V"] Step #5: Step #5: thread '' (9446) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=", "74M\u{fe0f}a=V"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9446== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x80,0x30,0x80,0x6,0x5,0x2b,0xe,0x3,0x2,0xc,0x3f,0x10,0x0,0x0,0x0,0x3,0x2,0x0,0x0,0x0,0x0, Step #5: 0\2000\200\006\005+\016\003\002\014?\020\000\000\000\003\002\000\000\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-8914410750a747ab829723bf364e94f1c7b9510e Step #5: Base64: MIAwgAYFKw4DAgw/EAAAAAMCAAAAAA== Step #5: MERGE-OUTER: attempt 129 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766627236 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/8914410750a747ab829723bf364e94f1c7b9510e' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 254 processed earlier; will process 48 files now Step #5: Running test ["env", "--chdir=/tmp"] Step #5: === Compare result for: env ["--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-u=xZÃ"] Step #5: === Compare result for: env ["-u=xZÃ"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=xZ\303\203': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=xZ\303\203': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=xZÃ"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "--chdir=/tmp", "t(🪛(=jn6C5"] Step #5: === Compare result for: env ["-i", "--chdir=/tmp", "t(🪛(=jn6C5"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "--chdir=/tmp", "t(🪛(=jn6C5"] Step #5: Step #5: Running test ["env", "-i", "qJ=", "Vn=T"] Step #5: === Compare result for: env ["-i", "qJ=", "Vn=T"] Step #5: === OK Same behavior Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "🔩w=GU"] Step #5: === Compare result for: env ["🔩w=GU"] Step #5: Rust stdout: Step #5: qJ= Step #5: Vn=T Step #5: 🔩w=GU Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Vn=T Step #5: qJ= Step #5: 🔩w=GU Step #5: Step #5: --- START diff Step #5: -qJ= Step #5: +LC_ALL=C Step #5: Vn=T Step #5: +qJ= Step #5: 🔩w=GU Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["🔩w=GU"] Step #5: Step #5: thread '' (9452) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["🔩w=GU"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9452== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x0,0x0,0x0,0xc,0x4a,0x58,0x4c,0x20,0xd,0xa,0x87,0xa,0x0,0x0,0x0,0x1,0x66,0x45,0x0,0x0,0x0,0x2d,0xba,0x42,0x4d,0x50,0x50,0x50,0x61,0x64,0xa, Step #5: \000\000\000\014JXL \015\012\207\012\000\000\000\001fE\000\000\000-\272BMPPPad\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-269648d5afd03511007a40d2a913ddabd9603b4a Step #5: Base64: AAAADEpYTCANCocKAAAAAWZFAAAALbpCTVBQUGFkCg== Step #5: MERGE-OUTER: attempt 130 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766641495 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/269648d5afd03511007a40d2a913ddabd9603b4a' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 259 processed earlier; will process 43 files now Step #5: Running test ["env", "6=Gz72N"] Step #5: === Compare result for: env ["6=Gz72N"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: 6=Gz72N Step #5: Step #5: GNU stdout: Step #5: 6=Gz72N Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +6=Gz72N Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -6=Gz72N Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["6=Gz72N"] Step #5: Step #5: thread '' (9470) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["6=Gz72N"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9470== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5b,0x4c,0x69,0x6e,0x6b,0x5d,0xa,0x4e,0x61,0x6d,0x65,0x3d,0x2d,0x31,0x38,0x34,0x34,0x36,0x37,0x34,0x34,0x30,0x37,0x33,0x37,0x30,0x39,0x35,0x35,0x36,0x31,0x37, Step #5: [Link]\012Name=-1844674407370955617 Step #5: artifact_prefix='./'; Test unit written to ./crash-93822557e0a6e80dc5da8be827a8baf98ba22e3a Step #5: Base64: W0xpbmtdCk5hbWU9LTE4NDQ2NzQ0MDczNzA5NTU2MTc= Step #5: MERGE-OUTER: attempt 131 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766652083 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/93822557e0a6e80dc5da8be827a8baf98ba22e3a' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 260 processed earlier; will process 42 files now Step #5: Running test ["env", "-u=O7", "LQvm=KEW4Y"] Step #5: === Compare result for: env ["-u=O7", "LQvm=KEW4Y"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=O7': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=O7': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=O7", "LQvm=KEW4Y"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "VLw\u{fe0f}B=m"] Step #5: === Compare result for: env ["-0", "VLw\u{fe0f}B=m"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workVLw️B=m Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3VLw️B=mWORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workVLw️B=m Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3VLw️B=mWORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "VLw\u{fe0f}B=m"] Step #5: Step #5: thread '' (9476) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "VLw\u{fe0f}B=m"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9476== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x1,0x0,0x1,0x0,0x53,0x0,0xf,0x0,0x5b,0x3a,0x0,0x0,0x0,0x0,0x42,0xff,0xbc,0x5a,0xbc,0x8c,0xbc,0xff,0xbb,0xff,0x78,0x26,0x5b,0x85,0x0,0xf0,0x9d,0x85,0xa0,0xfc, Step #5: \001\000\001\000S\000\017\000[:\000\000\000\000B\377\274Z\274\214\274\377\273\377x&[\205\000\360\235\205\240\374 Step #5: artifact_prefix='./'; Test unit written to ./crash-dc2a737c6da17029773cc2915a821d8fe556021b Step #5: Base64: AQABAFMADwBbOgAAAABC/7xavIy8/7v/eCZbhQDwnYWg/A== Step #5: MERGE-OUTER: attempt 132 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766664056 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/dc2a737c6da17029773cc2915a821d8fe556021b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 262 processed earlier; will process 40 files now Step #5: Running test ["env", "-v", "n🧰\u{fe0f}R=", "(hRb=H"] Step #5: === Compare result for: env ["-v", "n🧰\u{fe0f}R=", "(hRb=H"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: n🧰️R= Step #5: (hRb=H Step #5: Step #5: GNU stdout: Step #5: (hRb=H Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: n🧰️R= Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: +(hRb=H Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: n🧰️R= Step #5: -(hRb=H Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: n🧰️R= Step #5: setenv: (hRb=H Step #5: --- START diff Step #5: +n🧰️R= Step #5: +setenv: (hRb=H Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "n🧰\u{fe0f}R=", "(hRb=H"] Step #5: Step #5: thread '' (9485) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "n🧰\u{fe0f}R=", "(hRb=H"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9485== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x29,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0, Step #5: )\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-b0ee151facd4576899cf2a0f2fbfe8eda558b7e5 Step #5: Base64: KQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Step #5: MERGE-OUTER: attempt 133 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766675237 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b0ee151facd4576899cf2a0f2fbfe8eda558b7e5' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 263 processed earlier; will process 39 files now Step #5: Running test ["env", "-v", "-vv", "-u=Gs", "--chdir=/tmp"] Step #5: === Compare result for: env ["-v", "-vv", "-u=Gs", "--chdir=/tmp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =Gs Step #5: env: cannot unset '=Gs': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=Gs Step #5: +env: cannot unset '=Gs': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "-u=Gs", "--chdir=/tmp"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-v", "--chdir=/tmp", "a🪛=j"] Step #5: === Compare result for: env ["-0", "-v", "--chdir=/tmp", "a🪛=j"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: a🪛=j Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +a🪛=j Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-v", "--chdir=/tmp", "a🪛=j"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9498) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9498== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x6f,0x7,0xa7,0xff,0xff,0xff,0x0,0x0,0xff,0xbf,0xf7,0x7f,0x7f,0xff,0x7f,0xff,0x2f,0x2d,0x32,0xf4,0xff,0xff,0xff,0x0,0x0,0xff,0xbf,0xf7,0x7f,0x7f,0xff,0x7f,0xff,0x2f,0x2d,0x37,0x36,0x39,0x0,0x0,0x0,0x0, Step #5: o\007\247\377\377\377\000\000\377\277\367\177\177\377\177\377/-2\364\377\377\377\000\000\377\277\367\177\177\377\177\377/-769\000\000\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-047fabf89048f584614fd314aaf7eacd0ec878fa Step #5: Base64: bwen////AAD/v/d/f/9//y8tMvT///8AAP+/939//3//Ly03NjkAAAAA Step #5: MERGE-OUTER: attempt 134 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766688931 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/047fabf89048f584614fd314aaf7eacd0ec878fa' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 266 processed earlier; will process 36 files now Step #5: Running test ["env", "-i", "-0", "🪓4vÃ=C9"] Step #5: === Compare result for: env ["-i", "-0", "🪓4vÃ=C9"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "RxÃo=", "rr=6UM"] Step #5: === Compare result for: env ["-0", "RxÃo=", "rr=6UM"] Step #5: Rust stdout: Step #5: 🪓4vÃ=C9RxÃo=rr=6UM Step #5: GNU stdout: Step #5: LC_ALL=CRxÃo=rr=6UM🪓4vÃ=C9 Step #5: --- START diff Step #5: -🪓4vÃ=C9RxÃo=rr=6UM Step #5: +LC_ALL=CRxÃo=rr=6UM🪓4vÃ=C9 Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "RxÃo=", "rr=6UM"] Step #5: Step #5: thread '' (9513) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "RxÃo=", "rr=6UM"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9513== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x5,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x3,0x0,0x1,0x0,0x0,0x0,0x0,0x1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x7a, Step #5: \005\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\003\000\001\000\000\000\000\001\000\000\000\000\000\000\000\000z Step #5: artifact_prefix='./'; Test unit written to ./crash-36fb5172c1cacf8fd5b7d1a2dc60376253c8d3a4 Step #5: Base64: BQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAAEAAAAAAQAAAAAAAAAAeg== Step #5: MERGE-OUTER: attempt 135 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766700523 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/36fb5172c1cacf8fd5b7d1a2dc60376253c8d3a4' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 268 processed earlier; will process 34 files now Step #5: Running test ["env", "-u=oyr", "LO=R🪛", "ttB🪛=(G🔩"] Step #5: === Compare result for: env ["-u=oyr", "LO=R🪛", "ttB🪛=(G🔩"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=oyr': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=oyr': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=oyr", "LO=R🪛", "ttB🪛=(G🔩"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "H\u{fe0f}m=", "(w🪓2🪓=(ÃSz"] Step #5: === Compare result for: env ["-0", "H\u{fe0f}m=", "(w🪓2🪓=(ÃSz"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workH️m=(w🪓2🪓=(ÃSz Step #5: GNU stdout: Step #5: (w🪓2🪓=(ÃSzAFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0H️m=JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/workH️m=(w🪓2🪓=(ÃSz Step #5: +(w🪓2🪓=(ÃSzAFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0H️m=JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "H\u{fe0f}m=", "(w🪓2🪓=(ÃSz"] Step #5: Step #5: thread '' (9523) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "H\u{fe0f}m=", "(w🪓2🪓=(ÃSz"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9523== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x26,0x16,0x16,0xf,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0xf,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x16,0x2a,0x16, Step #5: &\026\026\017\026\026\026\026\026\026\026\026\026\026\026\017\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026\026*\026 Step #5: artifact_prefix='./'; Test unit written to ./crash-e9f6eb579aa2989cb23144179eda23ec81a98753 Step #5: Base64: JhYWDxYWFhYWFhYWFhYWDxYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYqFg== Step #5: MERGE-OUTER: attempt 136 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766711112 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/e9f6eb579aa2989cb23144179eda23ec81a98753' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 270 processed earlier; will process 32 files now Step #5: Running test ["env", "-0", "-u=nAif🧰SAm"] Step #5: === Compare result for: env ["-0", "-u=nAif🧰SAm"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=nAif\360\237\247\260SAm': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=nAif\360\237\247\260SAm': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=nAif🧰SAm"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-0", "-v", "(uBM=h🔗ÃlO"] Step #5: === Compare result for: env ["-0", "-v", "(uBM=h🔗ÃlO"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work(uBM=h🔗ÃlO Step #5: GNU stdout: Step #5: (uBM=h🔗ÃlOAFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work(uBM=h🔗ÃlO Step #5: +(uBM=h🔗ÃlOAFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: (uBM=h🔗ÃlO Step #5: --- START diff Step #5: +(uBM=h🔗ÃlO Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-0", "-v", "(uBM=h🔗ÃlO"] Step #5: Step #5: thread '' (9532) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v", "(uBM=h🔗ÃlO"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9532== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x4,0x8,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0, Step #5: \004\010\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-be0100af7d0f54594f5b2d338ab3a0d6488062c4 Step #5: Base64: BAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA= Step #5: MERGE-OUTER: attempt 137 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766722918 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/be0100af7d0f54594f5b2d338ab3a0d6488062c4' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 272 processed earlier; will process 30 files now Step #5: Running test ["env", "-i", "-0", "-vv"] Step #5: === Compare result for: env ["-i", "-0", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-0' Step #5: arg[3]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-0' Step #5: -arg[3]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-0", "-vv"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-v", "-u=Qyo🧰SQDt"] Step #5: === Compare result for: env ["-v", "-u=Qyo🧰SQDt"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =Qyo🧰SQDt Step #5: env: cannot unset '=Qyo\360\237\247\260SQDt': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=Qyo🧰SQDt Step #5: +env: cannot unset '=Qyo\360\237\247\260SQDt': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-u=Qyo🧰SQDt"] Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "-vv", "-u=9pz"] Step #5: === Compare result for: env ["-v", "-vv", "-u=9pz"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: =9pz Step #5: env: cannot unset '=9pz': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +=9pz Step #5: +env: cannot unset '=9pz': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-v", "-vv", "-u=9pz"] Step #5: Step #5: Running test ["env", "--chdir=/tmp", "S=MiF"] Step #5: === Compare result for: env ["--chdir=/tmp", "S=MiF"] Step #5: Rust stderr: Step #5: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["--chdir=/tmp", "S=MiF"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-v", "rx=🪓n"] Step #5: === Compare result for: env ["-v", "rx=🪓n"] Step #5: Rust stdout: Step #5: rx=🪓n Step #5: Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: rx=🪓n Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: rx=🪓n Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: rx=🪓n Step #5: --- START diff Step #5: +rx=🪓n Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "rx=🪓n"] Step #5: Step #5: thread '' (9541) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "rx=🪓n"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9541== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7a,0xff,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xff,0x56,0x69,0x72,0x74,0x75,0x61,0x6c,0x4d,0x61,0x63,0x68,0x69,0x6e,0x65,0x49,0x6e,0xff, Step #5: z\377\377\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\377VirtualMachineIn\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-1c4f1c61e0cf7930128f9251436b06d807239157 Step #5: Base64: ev//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/VmlydHVhbE1hY2hpbmVJbv8= Step #5: MERGE-OUTER: attempt 138 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766737536 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1c4f1c61e0cf7930128f9251436b06d807239157' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 277 processed earlier; will process 25 files now Step #5: Running test ["env", "-v", "=K(r", "nÃ="] Step #5: === Compare result for: env ["-v", "=K(r", "nÃ="] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: nÃ= Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: nÃ= Step #5: =K(r Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: +GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: -GEM_HOME=/out/fuzz-gem Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: nÃ= Step #5: +=K(r Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: warning: env-warning-no-name-specified Step #5: GNU stderr: Step #5: =K(r Step #5: setenv: nÃ= Step #5: --- START diff Step #5: -warning: env-warning-no-name-specified Step #5: +=K(r Step #5: +setenv: nÃ= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "=K(r", "nÃ="] Step #5: Step #5: thread '' (9559) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "=K(r", "nÃ="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9559== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x31,0x53,0x63,0x6c,0x61,0x73,0x73,0xa,0x62,0x42,0x42,0x67,0xa,0x73,0x69,0x64,0xa,0x53,0xa,0x63,0x6c,0x61,0x73,0x73,0xa,0x62,0x42,0x42,0x67,0x7b,0xa,0x69,0x7d,0x61,0x6c,0x6c,0x6f,0x77,0xa,0x2a,0x7e,0x62,0x3a,0x2a,0xa,0x2a,0x3b,0x3b,0x61,0x6c,0x6c,0x6f,0x77,0xa,0x2a,0x7e,0x62,0x3a,0x2a,0xa,0x2a,0x3b,0x61,0x6c,0x6c,0x6f,0x77,0xa,0x2a,0x7e,0x62,0x3a,0x2a, Step #5: S1Sclass\012bBBg\012sid\012S\012class\012bBBg{\012i}allow\012*~b:*\012*;;allow\012*~b:*\012*;allow\012*~b:* Step #5: artifact_prefix='./'; Test unit written to ./crash-b192deff0d39c6b9c1c50473e5ea60c5075a2357 Step #5: Base64: UzFTY2xhc3MKYkJCZwpzaWQKUwpjbGFzcwpiQkJnewppfWFsbG93Cip+YjoqCio7O2FsbG93Cip+YjoqCio7YWxsb3cKKn5iOio= Step #5: MERGE-OUTER: attempt 139 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766751140 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b192deff0d39c6b9c1c50473e5ea60c5075a2357' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 278 processed earlier; will process 24 files now Step #5: Running test ["env", "-u=🔩K(HYt", "Z="] Step #5: === Compare result for: env ["-u=🔩K(HYt", "Z="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=\360\237\224\251K(HYt': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=\360\237\224\251K(HYt': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=🔩K(HYt", "Z="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i", "-u=uR🔗ÃV", "🔩CLx=(Xh"] Step #5: === Compare result for: env ["-i", "-u=uR🔗ÃV", "🔩CLx=(Xh"] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: 🔩CLx=(Xh Step #5: Step #5: --- START diff Step #5: +🔩CLx=(Xh Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=uR🔗ÃV", "🔩CLx=(Xh"] Step #5: Step #5: thread '' (9581) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=uR🔗ÃV", "🔩CLx=(Xh"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9581== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4f,0x7b,0x7d,0x4e,0x7b,0x7d,0x4f,0x7b,0x7d,0x4e,0x7b,0x7d,0x4f,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0xe,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4e,0x7b,0x7d,0x4d,0x7b, Step #5: N{}N{}N{}N{}N{}O{}N{}O{}N{}O{}N{}N{}N{}N{}N{}N{}N{}N{}N{}N{}N{}N{}N{}\016{}N{}N{}N{}N{}N{}N{}N{}M{ Step #5: artifact_prefix='./'; Test unit written to ./crash-bb3fcbdb2409f250c5be5dfc81477221f8256143 Step #5: Base64: Tnt9Tnt9Tnt9Tnt9Tnt9T3t9Tnt9T3t9Tnt9T3t9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Dnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9Tnt9TXs= Step #5: MERGE-OUTER: attempt 140 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766762638 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/bb3fcbdb2409f250c5be5dfc81477221f8256143' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 280 processed earlier; will process 22 files now Step #5: Running test ["env", "pJbJ5=", "emmL0=Gh("] Step #5: === Compare result for: env ["pJbJ5=", "emmL0=Gh("] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: pJbJ5= Step #5: emmL0=Gh( Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: emmL0=Gh( Step #5: pJbJ5= Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -pJbJ5= Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: emmL0=Gh( Step #5: +pJbJ5= Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["pJbJ5=", "emmL0=Gh("] Step #5: Step #5: thread '' (9606) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["pJbJ5=", "emmL0=Gh("] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9606== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x5f,0x2,0x1,0x0,0x30,0x35,0x6,0x7,0x2a,0x86,0x48,0xce,0x38,0x4,0x1,0x30,0x2a,0x2,0x21,0x0,0xff,0xff,0xff,0xfd,0xff,0xff,0xff,0xf9,0xff,0xff,0x20,0xff,0xff,0xff,0xbf,0xa,0x5d,0x2,0x2,0x4,0x86,0x2a,0x2b,0xd9,0xe0,0x81,0xf7,0x48,0x86,0xd,0x1,0x7,0x2,0x1,0x27,0x2,0x2,0x58,0xd5,0x4,0x23,0x2,0x21,0x1f,0x1f,0x2a,0x85,0x83,0x2,0x1f,0x1f,0x48,0xce,0x36,0x48,0xce,0x38,0x4,0x1,0x30,0x2a,0x2,0x21,0x0,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x1,0x3b,0x10,0x1,0x6, Step #5: 0_\002\001\00005\006\007*\206H\3168\004\0010*\002!\000\377\377\377\375\377\377\377\371\377\377 \377\377\377\277\012]\002\002\004\206*+\331\340\201\367H\206\015\001\007\002\001'\002\002X\325\004#\002!\037\037*\205\203\002\037\037H\3166H\3168\004\0010*\002!\000\377\377\377\377\377\377\377\001;\020\001\006 Step #5: artifact_prefix='./'; Test unit written to ./crash-c6b837384a4938f06c883357788fee8461ea8295 Step #5: Base64: MF8CAQAwNQYHKoZIzjgEATAqAiEA/////f////n//yD///+/Cl0CAgSGKivZ4IH3SIYNAQcCAScCAljVBCMCIR8fKoWDAh8fSM42SM44BAEwKgIhAP////////8BOxABBg== Step #5: MERGE-OUTER: attempt 141 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766775507 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c6b837384a4938f06c883357788fee8461ea8295' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 281 processed earlier; will process 21 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9612) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9612== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x7a,0xff,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xff,0xff, Step #5: z\377\377\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\377\377 Step #5: artifact_prefix='./'; Test unit written to ./crash-6d08f9296e3928500767f9ea43ff34a60de50578 Step #5: Base64: ev//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD//w== Step #5: MERGE-OUTER: attempt 142 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766786887 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/6d08f9296e3928500767f9ea43ff34a60de50578' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 282 processed earlier; will process 20 files now Step #5: Running test ["env", "-v", "aT=", "oe(=CkZO"] Step #5: === Compare result for: env ["-v", "aT=", "oe(=CkZO"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: aT= Step #5: oe(=CkZO Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aT= Step #5: oe(=CkZO Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: aT= Step #5: oe(=CkZO Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: (empty) Step #5: GNU stderr: Step #5: aT= Step #5: setenv: oe(=CkZO Step #5: --- START diff Step #5: +aT= Step #5: +setenv: oe(=CkZO Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-v", "aT=", "oe(=CkZO"] Step #5: Step #5: thread '' (9618) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v", "aT=", "oe(=CkZO"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9618== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x30,0x80,0x2,0x2,0x7f,0x1b,0x30,0x80,0x30,0x80,0x6,0x2,0xa6,0x40,0x0,0x0,0x4,0x0,0x0,0x0,0xa0,0x80,0x30,0x80,0x6,0x9,0x2b,0x6,0x1,0x5,0x5,0x7,0x30,0x1,0x3,0x24,0x80,0x3,0xb,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0xa,0x2,0x1,0xfb,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xd,0x1,0x0, Step #5: 0\200\002\002\177\0330\2000\200\006\002\246@\000\000\004\000\000\000\240\2000\200\006\011+\006\001\005\005\0070\001\003$\200\003\013\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\012\002\001\373\000\000\000\000\000\000\000\000\000\000\015\001\000 Step #5: artifact_prefix='./'; Test unit written to ./crash-81e69114fabb08cf073068d677662692ad5ce961 Step #5: Base64: MIACAn8bMIAwgAYCpkAAAAQAAACggDCABgkrBgEFBQcwAQMkgAMLCgoKCgoKCgoKCgoKCgoKCgoKCgoKCgoKCgoKCgoKCgoKCgoKCgoKCgoKAgH7AAAAAAAAAAAAAA0BAA== Step #5: MERGE-OUTER: attempt 143 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766798718 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/81e69114fabb08cf073068d677662692ad5ce961' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 283 processed earlier; will process 19 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9624) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9624== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x53,0x30,0x5d,0x63,0x6c,0x61,0x73,0x73,0xa,0x73,0x9,0x73,0x69,0x64,0x9,0x4b,0xa,0x63,0x6c,0x61,0x73,0x73,0xa,0x73,0x7b,0x70,0x7d,0x3b,0x75,0x73,0x65,0x72,0xa,0x53,0xa,0x72,0x6f,0x6c,0x65,0x73,0x9,0x73,0x3b,0x63,0x6f,0x6e,0x73,0x74,0x72,0x61,0x69,0x6e,0x20,0x73,0x7e,0x79,0x21,0x72,0x31,0x20,0x69,0x6e,0x63,0x6f,0x6d,0x70,0x20,0x72,0x32,0x20,0x61,0x6e,0x64,0x21,0x72,0x31,0x20,0x69,0x6e,0x63,0x6f,0x6d,0x70,0x20,0x72,0x32,0x20,0x61,0x6e,0x64,0x21,0x72,0x31,0x20,0x69,0x6e,0x63,0x6f,0x6d,0x70, Step #5: S0]class\012s\011sid\011K\012class\012s{p};user\012S\012roles\011s;constrain s~y!r1 incomp r2 and!r1 incomp r2 and!r1 incomp Step #5: artifact_prefix='./'; Test unit written to ./crash-fa0616ec2f0313790793b09c977ff06c89f1891e Step #5: Base64: UzBdY2xhc3MKcwlzaWQJSwpjbGFzcwpze3B9O3VzZXIKUwpyb2xlcwlzO2NvbnN0cmFpbiBzfnkhcjEgaW5jb21wIHIyIGFuZCFyMSBpbmNvbXAgcjIgYW5kIXIxIGluY29tcA== Step #5: MERGE-OUTER: attempt 144 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766809287 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/fa0616ec2f0313790793b09c977ff06c89f1891e' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 284 processed earlier; will process 18 files now Step #5: Running test ["env", "-i", "-vv"] Step #5: === Compare result for: env ["-i", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv"] Step #5: Step #5: #1 pulse exec/s: 0 rss: 28Mb Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-0", "-u=BJp"] Step #5: === Compare result for: env ["-0", "-u=BJp"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=BJp': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=BJp': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-0", "-u=BJp"] Step #5: Step #5: Running test ["env", "-i", "-vv"] Step #5: === Compare result for: env ["-i", "-vv"] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-i' Step #5: arg[2]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-i' Step #5: -arg[2]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-i", "-vv"] Step #5: Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9630) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9630== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-f71038f480ee15613446e5e04f5b691108de3443 Step #5: MERGE-OUTER: attempt 145 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766826055 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/f71038f480ee15613446e5e04f5b691108de3443' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 289 processed earlier; will process 13 files now Step #5: Running test ["env", "-v"] Step #5: === Compare result for: env ["-v"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-v"] Step #5: Step #5: thread '' (9648) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9648== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-130e76b96e4ac0aa02dae8f6f6640f17410d6975 Step #5: MERGE-OUTER: attempt 146 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766837889 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/130e76b96e4ac0aa02dae8f6f6640f17410d6975' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 290 processed earlier; will process 12 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9654) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9654== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-20e3d5408dccd60c6574e5967c26080e0920524b Step #5: MERGE-OUTER: attempt 147 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766849686 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/20e3d5408dccd60c6574e5967c26080e0920524b' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 291 processed earlier; will process 11 files now Step #5: Running test ["env", "-0", "-v"] Step #5: === Compare result for: env ["-0", "-v"] Step #5: Rust stdout: Step #5: SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- START diff Step #5: -SRC=/srcRESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawHOSTNAME=86c6da93dc0eCOVERAGE_EXTRA_ARGS=SHLVL=2AFL_FUZZER_ARGS=-m noneHOME=/rootSYSGOPATH=/root/goOLDPWD=/workspaceUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3FUZZING_LANGUAGE=rustFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25_=/usr/bin/timeoutHTTP_PORT=PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binBUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageFUZZING_ENGINE=libfuzzerDEBIAN_FRONTEND=noninteractiveGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goARCHITECTURE=x86_64GEM_HOME=/out/fuzz-gemHWASAN_OPTIONS=random_tags=0OUT=/workspace/out/libfuzzer-coverage-x86_64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64PWD=/workspace/out/libfuzzer-coverage-x86_64GEM_PATH=/install/ruzzyJAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCESANITIZER=coverageWORK=/work Step #5: +AFL_FUZZER_ARGS=-m noneARCHITECTURE=x86_64ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3BUILDER_OUTPUT=/builder/outputsCODE_COVERAGE_SRC=/opt/code_coverageCOVERAGE_EXTRA_ARGS=DEBIAN_FRONTEND=noninteractiveFUZZER_ARGS=-rss_limit_mb=2560 -timeout=25FUZZING_ENGINE=libfuzzerFUZZING_LANGUAGE=rustGEM_HOME=/out/fuzz-gemGEM_PATH=/install/ruzzyGOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/goHOME=/rootHOSTNAME=86c6da93dc0eHTTP_PORT=HWASAN_OPTIONS=random_tags=0JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/serverLC_ALL=CLLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profrawMSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3OLDPWD=/workspaceOUT=/workspace/out/libfuzzer-coverage-x86_64PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/binPWD=/workspace/out/libfuzzer-coverage-x86_64RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773SANITIZER=coverageSHLVL=2SRC=/srcSYSGOPATH=/root/goUBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3WORK=/work_=/usr/bin/timeout__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["-0", "-v"] Step #5: Step #5: thread '' (9660) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-0", "-v"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9660== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-14ff1204fb7cebdbad9840e95f26cdee403ccc3d Step #5: MERGE-OUTER: attempt 148 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766859382 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/14ff1204fb7cebdbad9840e95f26cdee403ccc3d' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 292 processed earlier; will process 10 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-i", "-u=", "🔩C5="] Step #5: === Compare result for: env ["-i", "-u=", "🔩C5="] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: 🔩C5= Step #5: Step #5: --- START diff Step #5: +🔩C5= Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stdout differs, stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-u=", "🔩C5="] Step #5: Step #5: thread '' (9667) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-u=", "🔩C5="] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9667== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-1fb72aa260f1f429dab866d61d74f87573333a27 Step #5: MERGE-OUTER: attempt 149 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766870525 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/1fb72aa260f1f429dab866d61d74f87573333a27' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 294 processed earlier; will process 8 files now Step #5: Running test ["env", "-i", "-v", "-u=7🧰"] Step #5: === Compare result for: env ["-i", "-v", "-u=7🧰"] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: --- END diff Step #5: Step #5: Different exit code: (Rust: 125, GNU: 0) Step #5: Discrepancies detected: stderr differs, exit code differs Step #5: === KO Test failed and will panic for: env ["-i", "-v", "-u=7🧰"] Step #5: Step #5: thread '' (9676) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-i", "-v", "-u=7🧰"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9676== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-d66361ba95c9fe829e9ebbab526945a493d8ccb1 Step #5: MERGE-OUTER: attempt 150 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766880630 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/d66361ba95c9fe829e9ebbab526945a493d8ccb1' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 295 processed earlier; will process 7 files now Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9682) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9682== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-c1b37030d46c9d057ae74fc0e66fc68a13fa1c71 Step #5: MERGE-OUTER: attempt 151 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766891110 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c1b37030d46c9d057ae74fc0e66fc68a13fa1c71' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 296 processed earlier; will process 6 files now Step #5: Running test ["env", "F=bpE"] Step #5: === Compare result for: env ["F=bpE"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: F=bpE Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: F=bpE Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +F=bpE Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: +JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: -JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: -F=bpE Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env ["F=bpE"] Step #5: Step #5: thread '' (9697) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["F=bpE"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9697== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-c7d769a6566e333ca15f0e2d7a8e0b2f04f69acd Step #5: MERGE-OUTER: attempt 152 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766901711 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/c7d769a6566e333ca15f0e2d7a8e0b2f04f69acd' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 297 processed earlier; will process 5 files now Step #5: Running test ["env", "-vv", "--chdir=/tmp", "ÃÃ="] Step #5: === Compare result for: env ["-vv", "--chdir=/tmp", "ÃÃ="] Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: arg[2]: '--chdir=/tmp' Step #5: arg[3]: 'ÃÃ=' Step #5: fuzz_env: env-error-must-specify-command-with-chdir Step #5: Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: GNU stderr: Step #5: ÃÃ= Step #5: env: must specify command with --chdir (-C) Step #5: Try 'env --help' for more information. Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: -arg[2]: '--chdir=/tmp' Step #5: -arg[3]: 'ÃÃ=' Step #5: -fuzz_env: env-error-must-specify-command-with-chdir Step #5: -Try '/workspace/out/libfuzzer-coverage-x86_64/fuzz_env --help' for more information. Step #5: +ÃÃ= Step #5: +env: must specify command with --chdir (-C) Step #5: +Try 'env --help' for more information. Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-vv", "--chdir=/tmp", "ÃÃ="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env", "-vv"] Step #5: === Compare result for: env ["-vv"] Step #5: Rust stdout: Step #5: SRC=/src Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: HOSTNAME=86c6da93dc0e Step #5: COVERAGE_EXTRA_ARGS= Step #5: SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: HOME=/root Step #5: SYSGOPATH=/root/go Step #5: OLDPWD=/workspace Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: FUZZING_LANGUAGE=rust Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: _=/usr/bin/timeout Step #5: HTTP_PORT= Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: FUZZING_ENGINE=libfuzzer Step #5: DEBIAN_FRONTEND=noninteractive Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: ARCHITECTURE=x86_64 Step #5: GEM_HOME=/out/fuzz-gem Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: GEM_PATH=/install/ruzzy Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: SANITIZER=coverage Step #5: WORK=/work Step #5: Step #5: GNU stdout: Step #5: AFL_FUZZER_ARGS=-m none Step #5: ARCHITECTURE=x86_64 Step #5: ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: FUZZING_ENGINE=libfuzzer Step #5: FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: GEM_PATH=/install/ruzzy Step #5: GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: HOME=/root Step #5: HOSTNAME=86c6da93dc0e Step #5: HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: LC_ALL=C Step #5: LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: OLDPWD=/workspace Step #5: OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: SHLVL=2 Step #5: SRC=/src Step #5: SYSGOPATH=/root/go Step #5: UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: _=/usr/bin/timeout Step #5: __LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: Step #5: --- START diff Step #5: -SRC=/src Step #5: -RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: -MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: -HOSTNAME=86c6da93dc0e Step #5: -COVERAGE_EXTRA_ARGS= Step #5: -SHLVL=2 Step #5: AFL_FUZZER_ARGS=-m none Step #5: -HOME=/root Step #5: -SYSGOPATH=/root/go Step #5: -OLDPWD=/workspace Step #5: -UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: -FUZZING_LANGUAGE=rust Step #5: -FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: -_=/usr/bin/timeout Step #5: -HTTP_PORT= Step #5: -PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: +ARCHITECTURE=x86_64 Step #5: +ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: BUILDER_OUTPUT=/builder/outputs Step #5: CODE_COVERAGE_SRC=/opt/code_coverage Step #5: -FUZZING_ENGINE=libfuzzer Step #5: +COVERAGE_EXTRA_ARGS= Step #5: DEBIAN_FRONTEND=noninteractive Step #5: -GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: -ARCHITECTURE=x86_64 Step #5: +FUZZER_ARGS=-rss_limit_mb=2560 -timeout=25 Step #5: +FUZZING_ENGINE=libfuzzer Step #5: +FUZZING_LANGUAGE=rust Step #5: GEM_HOME=/out/fuzz-gem Step #5: +GEM_PATH=/install/ruzzy Step #5: +GOPATH=/workspace/out/libfuzzer-coverage-x86_64//root/go Step #5: +HOME=/root Step #5: +HOSTNAME=86c6da93dc0e Step #5: +HTTP_PORT= Step #5: HWASAN_OPTIONS=random_tags=0 Step #5: -OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: -ASAN_OPTIONS=alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3 Step #5: +JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 Step #5: +JVM_LD_LIBRARY_PATH=/usr/lib/jvm/java-17-openjdk-amd64/lib/server Step #5: +LC_ALL=C Step #5: +LLVM_PROFILE_FILE=/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_env.%1m.profraw Step #5: +MSAN_OPTIONS=print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: +OLDPWD=/workspace Step #5: +OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #5: +PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/root/go/bin:/usr/lib/jvm/java-17-openjdk-amd64/bin:/usr/local/rvm/rubies/ruby-3.3.1/bin Step #5: PWD=/workspace/out/libfuzzer-coverage-x86_64 Step #5: -GEM_PATH=/install/ruzzy Step #5: -JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64 Step #5: -__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: +RESULTS=/builder/outputs/fbffdb6e-514a-4337-ab93-6c0c86c2c773 Step #5: SANITIZER=coverage Step #5: +SHLVL=2 Step #5: +SRC=/src Step #5: +SYSGOPATH=/root/go Step #5: +UBSAN_OPTIONS=print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3 Step #5: WORK=/work Step #5: +_=/usr/bin/timeout Step #5: +__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE Step #5: --- END diff Step #5: Step #5: Rust stderr: Step #5: arg[0]: 'env' Step #5: arg[1]: '-vv' Step #5: GNU stderr: Step #5: (empty) Step #5: --- START diff Step #5: -arg[0]: 'env' Step #5: -arg[1]: '-vv' Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs, stderr differs Step #5: === KO Test failed and will panic for: env ["-vv"] Step #5: Step #5: thread '' (9710) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env ["-vv"] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9710== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-b73a0d270d45b6fd9b3c948c7a5f56d74954fefc Step #5: MERGE-OUTER: attempt 153 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766914073 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b73a0d270d45b6fd9b3c948c7a5f56d74954fefc' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 299 processed earlier; will process 3 files now Step #5: Running test ["env", "-i"] Step #5: === Compare result for: env ["-i"] Step #5: === OK Same behavior Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: Running test ["env"] Step #5: === Compare result for: env [] Step #5: Rust stdout: Step #5: (empty) Step #5: GNU stdout: Step #5: LC_ALL=C Step #5: Step #5: --- START diff Step #5: +LC_ALL=C Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stdout differs Step #5: === KO Test failed and will panic for: env [] Step #5: Step #5: thread '' (9735) panicked at /src/rust-coreutils/fuzz/uufuzz/src/lib.rs:378:13: Step #5: Test failed for: env [] Step #5: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Step #5: ==9735== ERROR: libFuzzer: deadly signal Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-b94c76f06abe3195ff725d7329199e9611f1fe80 Step #5: MERGE-OUTER: attempt 154 Step #5: WARNING: Failed to find function "__sanitizer_acquire_crash_state". Step #5: WARNING: Failed to find function "__sanitizer_print_stack_trace". Step #5: WARNING: Failed to find function "__sanitizer_set_death_callback". Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 766924387 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge1263.txt' Step #5: MERGE-INNER: '/corpus/fuzz_env/b94c76f06abe3195ff725d7329199e9611f1fe80' caused a failure at the previous merge step Step #5: MERGE-INNER: 302 total files; 301 processed earlier; will process 1 files now Step #5: Running test ["env", "-u=cw⚙", "z8="] Step #5: === Compare result for: env ["-u=cw⚙", "z8="] Step #5: Rust stderr: Step #5: env-error-cannot-unset Step #5: GNU stderr: Step #5: cannot unset '=cw\342\232\231': Invalid argument Step #5: --- START diff Step #5: -env-error-cannot-unset Step #5: +cannot unset '=cw\342\232\231': Invalid argument Step #5: --- END diff Step #5: Step #5: Discrepancies detected: stderr differs Step #5: === KO Test completed with discrepancies for: env ["-u=cw⚙", "z8="] Step #5: Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #1 DONE exec/s: 0 rss: 29Mb Step #5: MERGE-OUTER: successful in 154 attempt(s) Step #5: MERGE-OUTER: the control file has 23913 bytes Step #5: MERGE-OUTER: consumed 0Mb (26Mb rss) to parse the control file Step #5: MERGE-OUTER: 0 new files with 0 new features added; 0 new coverage edges Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_cksum_error.log Step #5: [2025-11-03 06:53:54,186 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:54,195 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_env_error.log Step #5: [2025-11-03 06:53:55,109 INFO] Finding shared libraries for targets (if any). Step #5: [2025-11-03 06:53:55,117 INFO] Finished finding shared libraries for targets. Step #5: Coverage error, creating log file: /workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_parse_size_error.log Step #5: Running fuzz_non_utf8_paths Step #5: Running fuzz_tr