starting build "4ff4280b-04e0-4825-a9d6-5da2ca88f735" FETCHSOURCE Initialized empty Git repository in /workspace/.git/ From https://source.developers.google.com/p/clusterfuzz-external/r/oss-fuzz * branch 60835ac4207d5877f119129a2a1e8639ee4b92a3 -> FETCH_HEAD HEAD is now at 60835ac oss-fuzz/BASE_IMAGE -> oss-fuzz-base/BASE_IMAGE BUILD Step #0: Already have image (with digest): gcr.io/cloud-builders/docker Starting Step #0 Step #0: Sending build context to Docker daemon 6.144 kB Step #0: Step 1 : FROM gcr.io/oss-fuzz-base/base-builder Step #0: latest: Pulling from oss-fuzz-base/base-builder Step #0: d54efb8db41d: Already exists Step #0: f8b845f45a87: Already exists Step #0: e8db7bf7c39f: Already exists Step #0: 9654c40e9079: Already exists Step #0: 6d9ef359eaaa: Already exists Step #0: bdd5f4f483db: Pulling fs layer Step #0: 953a2e08c9a7: Pulling fs layer Step #0: 7fab8ecc1083: Pulling fs layer Step #0: 0fef48459fbc: Pulling fs layer Step #0: ac0baa7baab4: Pulling fs layer Step #0: 5c1af4e28c07: Pulling fs layer Step #0: c196a582c06f: Pulling fs layer Step #0: 5e192e49180f: Pulling fs layer Step #0: f700b623f404: Pulling fs layer Step #0: b3ba4dc75b28: Pulling fs layer Step #0: ac0baa7baab4: Waiting Step #0: b3ba4dc75b28: Waiting Step #0: c196a582c06f: Waiting Step #0: f700b623f404: Waiting Step #0: 5e192e49180f: Waiting Step #0: 5c1af4e28c07: Waiting Step #0: 0fef48459fbc: Waiting Step #0: 953a2e08c9a7: Verifying Checksum Step #0: 953a2e08c9a7: Download complete Step #0: 0fef48459fbc: Verifying Checksum Step #0: 0fef48459fbc: Download complete Step #0: bdd5f4f483db: Verifying Checksum Step #0: bdd5f4f483db: Download complete Step #0: 5c1af4e28c07: Verifying Checksum Step #0: 5c1af4e28c07: Download complete Step #0: 7fab8ecc1083: Verifying Checksum Step #0: 7fab8ecc1083: Download complete Step #0: 5e192e49180f: Verifying Checksum Step #0: 5e192e49180f: Download complete Step #0: f700b623f404: Verifying Checksum Step #0: f700b623f404: Download complete Step #0: b3ba4dc75b28: Download complete Step #0: c196a582c06f: Verifying Checksum Step #0: c196a582c06f: Download complete Step #0: bdd5f4f483db: Pull complete Step #0: ac0baa7baab4: Verifying Checksum Step #0: ac0baa7baab4: Download complete Step #0: 953a2e08c9a7: Pull complete Step #0: 7fab8ecc1083: Pull complete Step #0: 0fef48459fbc: Pull complete Step #0: ac0baa7baab4: Pull complete Step #0: 5c1af4e28c07: Pull complete Step #0: c196a582c06f: Pull complete Step #0: 5e192e49180f: Pull complete Step #0: f700b623f404: Pull complete Step #0: b3ba4dc75b28: Pull complete Step #0: Digest: sha256:5cbc2484eb0f05b81badf5a3b2d207cb6b5d9093437bb42968032aeab2d5c741 Step #0: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #0: ---> 1d31fa006b41 Step #0: Step 2 : MAINTAINER vitalybuka@chromium.org Step #0: ---> Running in e7927eff98fb Step #0: ---> 4084331da4b2 Step #0: Removing intermediate container e7927eff98fb Step #0: Step 3 : RUN apt-get install -y binutils make Step #0: ---> Running in 43ae9072602e Step #0: Reading package lists... Step #0: Building dependency tree... Step #0: Reading state information... Step #0: make is already the newest version (4.1-6). Step #0: binutils is already the newest version (2.26.1-1ubuntu1~16.04.3). Step #0: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #0: ---> e614f0ce23ee Step #0: Removing intermediate container 43ae9072602e Step #0: Step 4 : RUN git clone --depth 1 -b develop https://github.com/nlohmann/json.git Step #0: ---> Running in f36a3088a95e Step #0: Cloning into 'json'... Step #0:  ---> d9dbd9d06b4d Step #0: Removing intermediate container f36a3088a95e Step #0: Step 5 : WORKDIR json/ Step #0: ---> Running in 5f1d3dd12866 Step #0: ---> 25eaa2aac7ff Step #0: Removing intermediate container 5f1d3dd12866 Step #0: Step 6 : COPY build.sh *.options $SRC/ Step #0: ---> 4e4ada376803 Step #0: Removing intermediate container f3aac4316956 Step #0: Successfully built 4e4ada376803 Finished Step #0 Step #1: Already have image: gcr.io/oss-fuzz/json Starting Step #1 Step #1: { Step #1: "/src/json": { Step #1: "type": "git", Step #1: "url": "https://github.com/nlohmann/json.git", Step #1: "rev": "54db53c23018a2ebc967e5c70d31a11c5ea88874" Step #1: }, Step #1: "/src": { Step #1: "type": "git", Step #1: "url": "https://github.com/google/oss-fuzz.git", Step #1: "rev": "60835ac4207d5877f119129a2a1e8639ee4b92a3" Step #1: } Step #1: } Finished Step #1 Step #2: Already have image: gcr.io/oss-fuzz/json Starting Step #2 Step #2: --------------------------------------------------------------- Step #2: ar: creating /usr/lib/libFuzzingEngine.a Step #2: Compiling libFuzzer to /usr/lib/libFuzzingEngine.a ... done. Step #2: CC=clang Step #2: CXX=clang++ Step #2: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp Step #2: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ Step #2: --------------------------------------------------------------- Step #2: + make FUZZER_ENGINE=-lFuzzingEngine fuzzers -Ctest Step #2: make: Entering directory '/src/json/test' Step #2: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_json.cpp -o parse_afl_fuzzer Step #2: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_cbor.cpp -o parse_cbor_fuzzer Step #2: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_msgpack.cpp -o parse_msgpack_fuzzer Step #2: make: Leaving directory '/src/json/test' Step #2: ++ find test/ -maxdepth 1 -executable -type f Step #2: + FUZZER_FILES='test/parse_msgpack_fuzzer Step #2: test/parse_afl_fuzzer Step #2: test/parse_cbor_fuzzer' Step #2: + for F in '$FUZZER_FILES' Step #2: + cp test/parse_msgpack_fuzzer /workspace/out/address/ Step #2: ++ basename test/parse_msgpack_fuzzer .cpp Step #2: + FUZZER=parse_msgpack_fuzzer Step #2: + cp /src/fuzzer-parse.options /workspace/out/address/parse_msgpack_fuzzer.options Step #2: + for F in '$FUZZER_FILES' Step #2: + cp test/parse_afl_fuzzer /workspace/out/address/ Step #2: ++ basename test/parse_afl_fuzzer .cpp Step #2: + FUZZER=parse_afl_fuzzer Step #2: + cp /src/fuzzer-parse.options /workspace/out/address/parse_afl_fuzzer.options Step #2: + for F in '$FUZZER_FILES' Step #2: + cp test/parse_cbor_fuzzer /workspace/out/address/ Step #2: ++ basename test/parse_cbor_fuzzer .cpp Step #2: + FUZZER=parse_cbor_fuzzer Step #2: + cp /src/fuzzer-parse.options /workspace/out/address/parse_cbor_fuzzer.options Finished Step #2 Step #3: Already have image: gcr.io/oss-fuzz/json Starting Step #3 Step #3: adding: parse_afl_fuzzer (deflated 72%) Step #3: adding: parse_afl_fuzzer.options (stored 0%) Step #3: adding: parse_cbor_fuzzer (deflated 72%) Step #3: adding: parse_cbor_fuzzer.options (stored 0%) Step #3: adding: parse_msgpack_fuzzer (deflated 72%) Step #3: adding: parse_msgpack_fuzzer.options (stored 0%) Finished Step #3 Step #4: Pulling image: gcr.io/clusterfuzz-external/uploader Step #4: Using default tag: latest Step #4: latest: Pulling from clusterfuzz-external/uploader Step #4: d54efb8db41d: Already exists Step #4: f8b845f45a87: Already exists Step #4: e8db7bf7c39f: Already exists Step #4: 9654c40e9079: Already exists Step #4: 6d9ef359eaaa: Already exists Step #4: c163cdd81561: Pulling fs layer Step #4: c69cfa74468c: Pulling fs layer Step #4: c69cfa74468c: Verifying Checksum Step #4: c69cfa74468c: Download complete Step #4: c163cdd81561: Verifying Checksum Step #4: c163cdd81561: Download complete Step #4: c163cdd81561: Pull complete Step #4: c69cfa74468c: Pull complete Step #4: Digest: sha256:d57ef7c6b5637cbb23e7bca5edb0928fe9c6030b7dc12190b295166f29ea6e40 Step #4: Status: Downloaded newer image for gcr.io/clusterfuzz-external/uploader:latest Starting Step #4 Step #4: % Total % Received % Xferd Average Speed Time Time Time Current Step #4: Dload Upload Total Spent Left Speed Step #4: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.1M 0 0 100 10.1M 0 13.1M --:--:-- --:--:-- --:--:-- 13.1M 100 10.1M 0 0 100 10.1M 0 13.1M --:--:-- --:--:-- --:--:-- 13.1M Finished Step #4 Step #5: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #5 Step #5: % Total % Received % Xferd Average Speed Time Time Time Current Step #5: Dload Upload Total Spent Left Speed Step #5: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 292 0 0 100 292 0 743 --:--:-- --:--:-- --:--:-- 744 Finished Step #5 Step #6: Already have image: gcr.io/oss-fuzz/json Starting Step #6 Finished Step #6 Step #7: Already have image: gcr.io/oss-fuzz/json Starting Step #7 Step #7: --------------------------------------------------------------- Step #7: ar: creating /usr/lib/libFuzzingEngine.a Step #7: Compiling libFuzzer to /usr/lib/libFuzzingEngine.a ... done. Step #7: CC=clang Step #7: CXX=clang++ Step #7: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp Step #7: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ Step #7: --------------------------------------------------------------- Step #7: + make FUZZER_ENGINE=-lFuzzingEngine fuzzers -Ctest Step #7: make: Entering directory '/src/json/test' Step #7: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_json.cpp -o parse_afl_fuzzer Step #7: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_cbor.cpp -o parse_cbor_fuzzer Step #7: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_msgpack.cpp -o parse_msgpack_fuzzer Step #7: make: Leaving directory '/src/json/test' Step #7: ++ find test/ -maxdepth 1 -executable -type f Step #7: + FUZZER_FILES='test/parse_msgpack_fuzzer Step #7: test/parse_afl_fuzzer Step #7: test/parse_cbor_fuzzer' Step #7: + for F in '$FUZZER_FILES' Step #7: + cp test/parse_msgpack_fuzzer /workspace/out/undefined/ Step #7: ++ basename test/parse_msgpack_fuzzer .cpp Step #7: + FUZZER=parse_msgpack_fuzzer Step #7: + cp /src/fuzzer-parse.options /workspace/out/undefined/parse_msgpack_fuzzer.options Step #7: + for F in '$FUZZER_FILES' Step #7: + cp test/parse_afl_fuzzer /workspace/out/undefined/ Step #7: ++ basename test/parse_afl_fuzzer .cpp Step #7: + FUZZER=parse_afl_fuzzer Step #7: + cp /src/fuzzer-parse.options /workspace/out/undefined/parse_afl_fuzzer.options Step #7: + for F in '$FUZZER_FILES' Step #7: + cp test/parse_cbor_fuzzer /workspace/out/undefined/ Step #7: ++ basename test/parse_cbor_fuzzer .cpp Step #7: + FUZZER=parse_cbor_fuzzer Step #7: + cp /src/fuzzer-parse.options /workspace/out/undefined/parse_cbor_fuzzer.options Finished Step #7 Step #8: Already have image: gcr.io/oss-fuzz/json Starting Step #8 Step #8: adding: parse_afl_fuzzer (deflated 68%) Step #8: adding: parse_afl_fuzzer.options (stored 0%) Step #8: adding: parse_cbor_fuzzer (deflated 68%) Step #8: adding: parse_cbor_fuzzer.options (stored 0%) Step #8: adding: parse_msgpack_fuzzer (deflated 68%) Step #8: adding: parse_msgpack_fuzzer.options (stored 0%) Finished Step #8 Step #9: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #9 Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 3939k 0 0 100 3939k 0 7564k --:--:-- --:--:-- --:--:-- 7576k Finished Step #9 Step #10: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #10 Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 292 0 0 100 292 0 693 --:--:-- --:--:-- --:--:-- 693 100 292 0 0 100 292 0 693 --:--:-- --:--:-- --:--:-- 693 Finished Step #10 Step #11: Already have image: gcr.io/oss-fuzz/json Starting Step #11 Finished Step #11 Step #12: Already have image: gcr.io/oss-fuzz/json Starting Step #12 Step #12: --------------------------------------------------------------- Step #12: ar: creating /usr/lib/libFuzzingEngine.a Step #12: Compiling libFuzzer to /usr/lib/libFuzzingEngine.a ... done. Step #12: CC=clang Step #12: CXX=clang++ Step #12: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize-coverage=trace-pc-guard,trace-cmp Step #12: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ Step #12: --------------------------------------------------------------- Step #12: + make FUZZER_ENGINE=-lFuzzingEngine fuzzers -Ctest Step #12: make: Entering directory '/src/json/test' Step #12: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_json.cpp -o parse_afl_fuzzer Step #12: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_cbor.cpp -o parse_cbor_fuzzer Step #12: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_msgpack.cpp -o parse_msgpack_fuzzer Step #12: make: Leaving directory '/src/json/test' Step #12: ++ find test/ -maxdepth 1 -executable -type f Step #12: + FUZZER_FILES='test/parse_msgpack_fuzzer Step #12: test/parse_afl_fuzzer Step #12: test/parse_cbor_fuzzer' Step #12: + for F in '$FUZZER_FILES' Step #12: + cp test/parse_msgpack_fuzzer /workspace/out/memory/ Step #12: ++ basename test/parse_msgpack_fuzzer .cpp Step #12: + FUZZER=parse_msgpack_fuzzer Step #12: + cp /src/fuzzer-parse.options /workspace/out/memory/parse_msgpack_fuzzer.options Step #12: + for F in '$FUZZER_FILES' Step #12: + cp test/parse_afl_fuzzer /workspace/out/memory/ Step #12: ++ basename test/parse_afl_fuzzer .cpp Step #12: + FUZZER=parse_afl_fuzzer Step #12: + cp /src/fuzzer-parse.options /workspace/out/memory/parse_afl_fuzzer.options Step #12: + for F in '$FUZZER_FILES' Step #12: + cp test/parse_cbor_fuzzer /workspace/out/memory/ Step #12: ++ basename test/parse_cbor_fuzzer .cpp Step #12: + FUZZER=parse_cbor_fuzzer Step #12: + cp /src/fuzzer-parse.options /workspace/out/memory/parse_cbor_fuzzer.options Finished Step #12 Step #13: Already have image: gcr.io/oss-fuzz/json Starting Step #13 Step #13: adding: parse_afl_fuzzer (deflated 71%) Step #13: adding: parse_afl_fuzzer.options (stored 0%) Step #13: adding: parse_cbor_fuzzer (deflated 71%) Step #13: adding: parse_cbor_fuzzer.options (stored 0%) Step #13: adding: parse_msgpack_fuzzer (deflated 71%) Step #13: adding: parse_msgpack_fuzzer.options (stored 0%) Finished Step #13 Step #14: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #14 Step #14: % Total % Received % Xferd Average Speed Time Time Time Current Step #14: Dload Upload Total Spent Left Speed Step #14: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.8M 0 0 100 10.8M 0 15.0M --:--:-- --:--:-- --:--:-- 15.0M Finished Step #14 Step #15: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #15 Step #15: % Total % Received % Xferd Average Speed Time Time Time Current Step #15: Dload Upload Total Spent Left Speed Step #15: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 292 0 0 100 292 0 948 --:--:-- --:--:-- --:--:-- 951 Finished Step #15 Step #16: Already have image: gcr.io/oss-fuzz/json Starting Step #16 Finished Step #16 Step #17: Already have image: gcr.io/oss-fuzz/json Starting Step #17 Step #17: --------------------------------------------------------------- Step #17: /src/afl/llvm_mode/afl-llvm-rt.o.c:67:7: warning: initializing 'u8 *' (aka 'unsigned char *') with an expression of type 'char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #17: u8 *id_str = getenv(SHM_ENV_VAR); Step #17: ^ ~~~~~~~~~~~~~~~~~~~ Step #17: /src/afl/llvm_mode/afl-llvm-rt.o.c:75:23: warning: passing 'u8 *' (aka 'unsigned char *') to parameter of type 'const char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #17: u32 shm_id = atoi(id_str); Step #17: ^~~~~~ Step #17: /usr/include/stdlib.h:278:26: note: passing argument to parameter '__nptr' here Step #17: __NTH (atoi (const char *__nptr)) Step #17: ^ Step #17: /src/afl/llvm_mode/afl-llvm-rt.o.c:283:5: warning: assigning to 'u8 *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #17: x = getenv("AFL_INST_RATIO"); Step #17: ^ ~~~~~~~~~~~~~~~~~~~~~~~~ Step #17: /src/afl/llvm_mode/afl-llvm-rt.o.c:284:28: warning: passing 'u8 *' (aka 'unsigned char *') to parameter of type 'const char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #17: if (x) inst_ratio = atoi(x); Step #17: ^ Step #17: /usr/include/stdlib.h:278:26: note: passing argument to parameter '__nptr' here Step #17: __NTH (atoi (const char *__nptr)) Step #17: ^ Step #17: 4 warnings generated. Step #17: ar: creating /usr/lib/libFuzzingEngine.a Step #17: Compiling afl to /usr/lib/libFuzzingEngine.a ...rm -f afl-gcc afl-fuzz afl-showmap afl-tmin afl-gotcpu afl-analyze afl-as as afl-g++ afl-clang afl-clang++ *.o *~ a.out core core.[1-9][0-9]* *.stackdump test .test test-instr .test-instr0 .test-instr1 qemu_mode/qemu-2.3.0.tar.bz2 afl-qemu-trace Step #17: rm -rf out_dir qemu_mode/qemu-2.3.0 Step #17: make -C llvm_mode clean Step #17: make[1]: Entering directory '/src/afl/llvm_mode' Step #17: rm -f *.o *.so *~ a.out core core.[1-9][0-9]* test-instr .test-instr0 .test-instr1 Step #17: rm -f ../afl-clang-fast ../afl-llvm-pass.so ../afl-llvm-rt.o ../afl-llvm-rt-32.o ../afl-llvm-rt-64.o ../afl-clang-fast++ Step #17: make[1]: Leaving directory '/src/afl/llvm_mode' Step #17: make -C libdislocator clean Step #17: make[1]: Entering directory '/src/afl/libdislocator' Step #17: rm -f *.o *.so *~ a.out core core.[1-9][0-9]* Step #17: rm -f libdislocator.so Step #17: make[1]: Leaving directory '/src/afl/libdislocator' Step #17: make -C libtokencap clean Step #17: make[1]: Entering directory '/src/afl/libtokencap' Step #17: rm -f *.o *.so *~ a.out core core.[1-9][0-9]* Step #17: rm -f libtokencap.so Step #17: make[1]: Leaving directory '/src/afl/libtokencap' Step #17: [*] Checking for the ability to compile x86 code... Step #17: [+] Everything seems to be working, ready to compile. Step #17: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-gcc.c -o afl-gcc -ldl Step #17: set -e; for i in afl-g++ afl-clang afl-clang++; do ln -sf afl-gcc $i; done Step #17: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-fuzz.c -o afl-fuzz -ldl Step #17: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-showmap.c -o afl-showmap -ldl Step #17: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-tmin.c -o afl-tmin -ldl Step #17: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-gotcpu.c -o afl-gotcpu -ldl Step #17: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-analyze.c -o afl-analyze -ldl Step #17: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-as.c -o afl-as -ldl Step #17: ln -sf afl-as as Step #17: [*] Testing the CC wrapper and instrumentation output... Step #17: unset AFL_USE_ASAN AFL_USE_MSAN; AFL_QUIET=1 AFL_INST_RATIO=100 AFL_PATH=. ./afl-clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" test-instr.c -o test-instr -ldl Step #17: echo 0 | ./afl-showmap -m none -q -o .test-instr0 ./test-instr Step #17: echo 1 | ./afl-showmap -m none -q -o .test-instr1 ./test-instr Step #17: [+] All right, the instrumentation seems to be working! Step #17: [+] LLVM users: see llvm_mode/README.llvm for a faster alternative to afl-gcc. Step #17: [+] All done! Be sure to review README - it's pretty short and useful. Step #17: done. Step #17: CC=clang Step #17: CXX=clang++ Step #17: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard Step #17: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard -stdlib=libc++ Step #17: --------------------------------------------------------------- Step #17: + make FUZZER_ENGINE=-lFuzzingEngine fuzzers -Ctest Step #17: make: Entering directory '/src/json/test' Step #17: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_json.cpp -o parse_afl_fuzzer Step #17: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_cbor.cpp -o parse_cbor_fuzzer Step #17: clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard -stdlib=libc++ -std=c++11 -Wall -Wextra -pedantic -Weffc++ -Wcast-align -Wcast-qual -Wno-ctor-dtor-privacy -Wdisabled-optimization -Wformat=2 -Winit-self -Wmissing-declarations -Wmissing-include-dirs -Wold-style-cast -Woverloaded-virtual -Wredundant-decls -Wshadow -Wsign-conversion -Wsign-promo -Wstrict-overflow=5 -Wswitch -Wundef -Wno-unused -Wnon-virtual-dtor -Wreorder -Wdeprecated -Wno-float-equal -I ../src -I . -I thirdparty/catch -lFuzzingEngine src/fuzzer-parse_msgpack.cpp -o parse_msgpack_fuzzer Step #17: make: Leaving directory '/src/json/test' Step #17: ++ find test/ -maxdepth 1 -executable -type f Step #17: + FUZZER_FILES='test/parse_msgpack_fuzzer Step #17: test/parse_afl_fuzzer Step #17: test/parse_cbor_fuzzer' Step #17: + for F in '$FUZZER_FILES' Step #17: + cp test/parse_msgpack_fuzzer /workspace/out/address/ Step #17: ++ basename test/parse_msgpack_fuzzer .cpp Step #17: + FUZZER=parse_msgpack_fuzzer Step #17: + cp /src/fuzzer-parse.options /workspace/out/address/parse_msgpack_fuzzer.options Step #17: + for F in '$FUZZER_FILES' Step #17: + cp test/parse_afl_fuzzer /workspace/out/address/ Step #17: ++ basename test/parse_afl_fuzzer .cpp Step #17: + FUZZER=parse_afl_fuzzer Step #17: + cp /src/fuzzer-parse.options /workspace/out/address/parse_afl_fuzzer.options Step #17: + for F in '$FUZZER_FILES' Step #17: + cp test/parse_cbor_fuzzer /workspace/out/address/ Step #17: ++ basename test/parse_cbor_fuzzer .cpp Step #17: + FUZZER=parse_cbor_fuzzer Step #17: + cp /src/fuzzer-parse.options /workspace/out/address/parse_cbor_fuzzer.options Finished Step #17 Step #18: Already have image: gcr.io/oss-fuzz/json Starting Step #18 Step #18: adding: afl-analyze (deflated 60%) Step #18: adding: afl-as (deflated 65%) Step #18: adding: afl-cmin (deflated 63%) Step #18: adding: afl-fuzz (deflated 59%) Step #18: adding: afl-gcc (deflated 65%) Step #18: adding: afl-gotcpu (deflated 63%) Step #18: adding: afl-plot (deflated 61%) Step #18: adding: afl-showmap (deflated 61%) Step #18: adding: afl-tmin (deflated 61%) Step #18: adding: afl-whatsup (deflated 58%) Step #18: adding: parse_afl_fuzzer (deflated 72%) Step #18: adding: parse_afl_fuzzer.options (stored 0%) Step #18: adding: parse_cbor_fuzzer (deflated 72%) Step #18: adding: parse_cbor_fuzzer.options (stored 0%) Step #18: adding: parse_msgpack_fuzzer (deflated 72%) Step #18: adding: parse_msgpack_fuzzer.options (stored 0%) Finished Step #18 Step #19: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #19 Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 9109k 0 0 100 9109k 0 8161k 0:00:01 0:00:01 --:--:-- 8155k 100 9109k 0 0 100 9109k 0 4906k 0:00:01 0:00:01 --:--:-- 4905k Finished Step #19 Step #20: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #20 Step #20: % Total % Received % Xferd Average Speed Time Time Time Current Step #20: Dload Upload Total Spent Left Speed Step #20: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 292 0 0 100 292 0 573 --:--:-- --:--:-- --:--:-- 574 Finished Step #20 Step #21: Already have image: gcr.io/oss-fuzz/json Starting Step #21 Finished Step #21 PUSH Pushing gcr.io/oss-fuzz/json The push refers to a repository [gcr.io/oss-fuzz/json] df371850b9fd: Preparing 266f2c1a7cbd: Preparing be6f8f5bde30: Preparing bce5d7e0d7f6: Preparing a8aa4ef1f864: Preparing b1ec76bde71f: Preparing 24bf9f23a263: Preparing 89e1aff63a41: Preparing 9845e0494178: Preparing a8d7df2283e9: Preparing ff191fba4705: Preparing c942f3aa2fef: Preparing 919ce227defc: Preparing 56827159aa8b: Preparing 440e02c3dcde: Preparing 29660d0e5bb2: Preparing b1ec76bde71f: Waiting 85782553e37a: Preparing 745f5be9952c: Preparing 24bf9f23a263: Waiting 919ce227defc: Waiting 89e1aff63a41: Waiting 56827159aa8b: Waiting 440e02c3dcde: Waiting 29660d0e5bb2: Waiting 9845e0494178: Waiting 85782553e37a: Waiting ff191fba4705: Waiting c942f3aa2fef: Waiting a8d7df2283e9: Waiting a8aa4ef1f864: Mounted from oss-fuzz-base/base-builder bce5d7e0d7f6: Mounted from oss-fuzz-base/base-builder b1ec76bde71f: Mounted from oss-fuzz-base/base-builder 24bf9f23a263: Mounted from oss-fuzz-base/base-builder 9845e0494178: Mounted from oss-fuzz-base/base-builder a8d7df2283e9: Mounted from oss-fuzz-base/base-builder 89e1aff63a41: Mounted from oss-fuzz-base/base-builder ff191fba4705: Mounted from oss-fuzz-base/base-builder c942f3aa2fef: Mounted from oss-fuzz-base/base-builder 919ce227defc: Mounted from oss-fuzz-base/base-builder be6f8f5bde30: Pushed df371850b9fd: Pushed 440e02c3dcde: Pushed 29660d0e5bb2: Pushed 56827159aa8b: Pushed 85782553e37a: Pushed 745f5be9952c: Pushed 266f2c1a7cbd: Pushed latest: digest: sha256:988caf4fe8d6f577ddc7972700f0e4ee297499aec509b3629ef782162fecb13f size: 4083 DONE