starting build "e0376507-1046-489f-a1fc-f70edfadb359" FETCHSOURCE Initialized empty Git repository in /workspace/.git/ From https://source.developers.google.com/p/clusterfuzz-external/r/oss-fuzz * branch 60835ac4207d5877f119129a2a1e8639ee4b92a3 -> FETCH_HEAD HEAD is now at 60835ac oss-fuzz/BASE_IMAGE -> oss-fuzz-base/BASE_IMAGE BUILD Step #0: Already have image (with digest): gcr.io/cloud-builders/docker Starting Step #0 Step #0: Sending build context to Docker daemon 5.12 kB Step #0: Step 1 : FROM gcr.io/oss-fuzz-base/base-builder Step #0: latest: Pulling from oss-fuzz-base/base-builder Step #0: d54efb8db41d: Already exists Step #0: f8b845f45a87: Already exists Step #0: e8db7bf7c39f: Already exists Step #0: 9654c40e9079: Already exists Step #0: 6d9ef359eaaa: Already exists Step #0: bdd5f4f483db: Pulling fs layer Step #0: 953a2e08c9a7: Pulling fs layer Step #0: 7fab8ecc1083: Pulling fs layer Step #0: 0fef48459fbc: Pulling fs layer Step #0: ac0baa7baab4: Pulling fs layer Step #0: 5c1af4e28c07: Pulling fs layer Step #0: c196a582c06f: Pulling fs layer Step #0: 5e192e49180f: Pulling fs layer Step #0: f700b623f404: Pulling fs layer Step #0: b3ba4dc75b28: Pulling fs layer Step #0: c196a582c06f: Waiting Step #0: 0fef48459fbc: Waiting Step #0: 5e192e49180f: Waiting Step #0: f700b623f404: Waiting Step #0: ac0baa7baab4: Waiting Step #0: b3ba4dc75b28: Waiting Step #0: 5c1af4e28c07: Waiting Step #0: 953a2e08c9a7: Verifying Checksum Step #0: 953a2e08c9a7: Download complete Step #0: 0fef48459fbc: Verifying Checksum Step #0: 0fef48459fbc: Download complete Step #0: 7fab8ecc1083: Verifying Checksum Step #0: 7fab8ecc1083: Download complete Step #0: 5c1af4e28c07: Verifying Checksum Step #0: 5c1af4e28c07: Download complete Step #0: bdd5f4f483db: Download complete Step #0: 5e192e49180f: Verifying Checksum Step #0: 5e192e49180f: Download complete Step #0: f700b623f404: Verifying Checksum Step #0: f700b623f404: Download complete Step #0: b3ba4dc75b28: Verifying Checksum Step #0: b3ba4dc75b28: Download complete Step #0: c196a582c06f: Verifying Checksum Step #0: ac0baa7baab4: Verifying Checksum Step #0: ac0baa7baab4: Download complete Step #0: bdd5f4f483db: Pull complete Step #0: 953a2e08c9a7: Pull complete Step #0: 7fab8ecc1083: Pull complete Step #0: 0fef48459fbc: Pull complete Step #0: ac0baa7baab4: Pull complete Step #0: 5c1af4e28c07: Pull complete Step #0: c196a582c06f: Pull complete Step #0: 5e192e49180f: Pull complete Step #0: f700b623f404: Pull complete Step #0: b3ba4dc75b28: Pull complete Step #0: Digest: sha256:5cbc2484eb0f05b81badf5a3b2d207cb6b5d9093437bb42968032aeab2d5c741 Step #0: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #0: ---> 1d31fa006b41 Step #0: Step 2 : MAINTAINER kcc@google.com Step #0: ---> Running in 2d5e7f464769 Step #0: ---> f2a47b3f04f5 Step #0: Removing intermediate container 2d5e7f464769 Step #0: Step 3 : RUN apt-get install -y subversion Step #0: ---> Running in a13d9a55b033 Step #0: Reading package lists... Step #0: Building dependency tree... Step #0: Reading state information... Step #0: subversion is already the newest version (1.9.3-2ubuntu1). Step #0: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #0: ---> 62b2bc8f0d88 Step #0: Removing intermediate container a13d9a55b033 Step #0: Step 4 : RUN svn co https://llvm.org/svn/llvm-project/libcxxabi/trunk llvm_libcxxabi Step #0: ---> Running in 99bbbf76e070 Step #0: A llvm_libcxxabi/www Step #0: A llvm_libcxxabi/www/index.html Step #0: A llvm_libcxxabi/www/menu.css Step #0: A llvm_libcxxabi/www/spec.html Step #0: A llvm_libcxxabi/www/content.css Step #0: A llvm_libcxxabi/.gitignore Step #0: A llvm_libcxxabi/lib Step #0: A llvm_libcxxabi/lib/buildit Step #0: A llvm_libcxxabi/src Step #0: A llvm_libcxxabi/src/fallback_malloc.cpp Step #0: A llvm_libcxxabi/src/cxa_noexception.cpp Step #0: A llvm_libcxxabi/src/private_typeinfo.cpp Step #0: A llvm_libcxxabi/src/cxa_exception.cpp Step #0: A llvm_libcxxabi/src/fallback_malloc.h Step #0: A llvm_libcxxabi/src/cxa_aux_runtime.cpp Step #0: A llvm_libcxxabi/src/cxa_handlers.cpp Step #0: A llvm_libcxxabi/src/CMakeLists.txt Step #0: A llvm_libcxxabi/src/private_typeinfo.h Step #0: A llvm_libcxxabi/src/cxa_guard.cpp Step #0: A llvm_libcxxabi/src/cxa_vector.cpp Step #0: A llvm_libcxxabi/src/cxa_exception.hpp Step #0: A llvm_libcxxabi/src/stdlib_typeinfo.cpp Step #0: A llvm_libcxxabi/src/cxa_default_handlers.cpp Step #0: A llvm_libcxxabi/src/cxa_unexpected.cpp Step #0: A llvm_libcxxabi/src/stdlib_exception.cpp Step #0: A llvm_libcxxabi/src/cxa_handlers.hpp Step #0: A llvm_libcxxabi/src/cxa_personality.cpp Step #0: A llvm_libcxxabi/src/stdlib_stdexcept.cpp Step #0: A llvm_libcxxabi/src/cxa_demangle.cpp Step #0: A llvm_libcxxabi/src/config.h Step #0: A llvm_libcxxabi/src/abort_message.cpp Step #0: A llvm_libcxxabi/src/stdlib_new_delete.cpp Step #0: A llvm_libcxxabi/src/cxa_exception_storage.cpp Step #0: A llvm_libcxxabi/src/abort_message.h Step #0: A llvm_libcxxabi/src/cxa_thread_atexit.cpp Step #0: A llvm_libcxxabi/src/cxa_virtual.cpp Step #0: A llvm_libcxxabi/.clang-format Step #0: A llvm_libcxxabi/.arcconfig Step #0: A llvm_libcxxabi/CREDITS.TXT Step #0: A llvm_libcxxabi/CMakeLists.txt Step #0: A llvm_libcxxabi/fuzz Step #0: A llvm_libcxxabi/fuzz/CMakeLists.txt Step #0: A llvm_libcxxabi/fuzz/cxa_demangle_fuzzer.cpp Step #0: A llvm_libcxxabi/test Step #0: A llvm_libcxxabi/test/backtrace_test.pass.cpp Step #0: A llvm_libcxxabi/test/noexception3.pass.cpp Step #0: A llvm_libcxxabi/test/catch_member_function_pointer_02.pass.cpp Step #0: A llvm_libcxxabi/test/catch_reference_nullptr.pass.cpp Step #0: A llvm_libcxxabi/test/dynamic_cast3.pass.cpp Step #0: A llvm_libcxxabi/test/catch_array_02.pass.cpp Step #0: A llvm_libcxxabi/test/test_vector1.pass.cpp Step #0: A llvm_libcxxabi/test/dynamic_cast5.pass.cpp Step #0: A llvm_libcxxabi/test/test_vector3.pass.cpp Step #0: A llvm_libcxxabi/test/catch_function_01.pass.cpp Step #0: A llvm_libcxxabi/test/catch_function_03.pass.cpp Step #0: A llvm_libcxxabi/test/thread_local_destruction_order.pass.cpp Step #0: A llvm_libcxxabi/test/catch_pointer_reference.pass.cpp Step #0: A llvm_libcxxabi/test/native Step #0: A llvm_libcxxabi/test/native/arm-linux-eabi Step #0: A llvm_libcxxabi/test/native/arm-linux-eabi/ttype-encoding-90.pass.sh.s Step #0: A llvm_libcxxabi/test/native/arm-linux-eabi/lit.local.cfg Step #0: A llvm_libcxxabi/test/native/arm-linux-eabi/ttype-encoding-00.pass.sh.s Step #0: A llvm_libcxxabi/test/dynamic_cast_stress.pass.cpp Step #0: A llvm_libcxxabi/test/catch_pointer_nullptr.pass.cpp Step #0: A llvm_libcxxabi/test/dynamic_cast14.pass.cpp Step #0: A llvm_libcxxabi/test/unwind_01.pass.cpp Step #0: A llvm_libcxxabi/test/unwind_03.pass.cpp Step #0: A llvm_libcxxabi/test/catch_class_01.pass.cpp Step #0: A llvm_libcxxabi/test/catch_ptr.pass.cpp Step #0: A llvm_libcxxabi/test/catch_ptr_02.pass.cpp Step #0: A llvm_libcxxabi/test/unwind_05.pass.cpp Step #0: A llvm_libcxxabi/test/catch_class_03.pass.cpp Step #0: A llvm_libcxxabi/test/test_demangle.pass.cpp Step #0: A llvm_libcxxabi/test/noexception2.pass.cpp Step #0: A llvm_libcxxabi/test/catch_in_noexcept.pass.cpp Step #0: A llvm_libcxxabi/test/catch_member_function_pointer_01.pass.cpp Step #0: A llvm_libcxxabi/test/noexception4.pass.cpp Step #0: A llvm_libcxxabi/test/cxa_thread_atexit_test.pass.cpp Step #0: A llvm_libcxxabi/test/libcxxabi Step #0: A llvm_libcxxabi/test/libcxxabi/test Step #0: A llvm_libcxxabi/test/libcxxabi/test/__init__.py Step #0: A llvm_libcxxabi/test/libcxxabi/test/config.py Step #0: A llvm_libcxxabi/test/libcxxabi/__init__.py Step #0: A llvm_libcxxabi/test/uncaught_exceptions.pass.cpp Step #0: A llvm_libcxxabi/test/catch_array_01.pass.cpp Step #0: A llvm_libcxxabi/test/test_exception_storage.pass.cpp Step #0: A llvm_libcxxabi/test/test_vector2.pass.cpp Step #0: A llvm_libcxxabi/test/catch_multi_level_pointer.pass.cpp Step #0: A llvm_libcxxabi/test/test_fallback_malloc.pass.cpp Step #0: A llvm_libcxxabi/test/support Step #0: A llvm_libcxxabi/test/support/timer.hpp Step #0: A llvm_libcxxabi/test/testit Step #0: A llvm_libcxxabi/test/CMakeLists.txt Step #0: A llvm_libcxxabi/test/catch_function_02.pass.cpp Step #0: A llvm_libcxxabi/test/catch_member_pointer_nullptr.pass.cpp Step #0: A llvm_libcxxabi/test/inherited_exception.pass.cpp Step #0: A llvm_libcxxabi/test/cxa_bad_cast.pass.cpp Step #0: A llvm_libcxxabi/test/test_aux_runtime.pass.cpp Step #0: A llvm_libcxxabi/test/cxa_bad_typeid.pass.cpp Step #0: A llvm_libcxxabi/test/lit.cfg Step #0: A llvm_libcxxabi/test/test_exception_address_alignment.pass.cpp Step #0: A llvm_libcxxabi/test/test_guard.pass.cpp Step #0: A llvm_libcxxabi/test/catch_member_data_pointer_01.pass.cpp Step #0: A llvm_libcxxabi/test/incomplete_type.sh.cpp Step #0: A llvm_libcxxabi/test/test_aux_runtime_op_array_new.pass.cpp Step #0: A llvm_libcxxabi/test/unwind_02.pass.cpp Step #0: A llvm_libcxxabi/test/unwind_04.pass.cpp Step #0: A llvm_libcxxabi/test/catch_const_pointer_nullptr.pass.cpp Step #0: A llvm_libcxxabi/test/catch_class_02.pass.cpp Step #0: A llvm_libcxxabi/test/lit.site.cfg.in Step #0: A llvm_libcxxabi/test/unwind_06.pass.cpp Step #0: A llvm_libcxxabi/test/catch_class_04.pass.cpp Step #0: A llvm_libcxxabi/test/noexception1.pass.cpp Step #0: A llvm_libcxxabi/LICENSE.TXT Step #0: A llvm_libcxxabi/cmake Step #0: A llvm_libcxxabi/cmake/config-ix.cmake Step #0: A llvm_libcxxabi/include Step #0: A llvm_libcxxabi/include/cxxabi.h Step #0: A llvm_libcxxabi/include/__cxxabi_config.h Step #0: Checked out revision 298547. Step #0: ---> 2a104ca03eed Step #0: Removing intermediate container 99bbbf76e070 Step #0: Step 5 : WORKDIR llvm_libcxxabi Step #0: ---> Running in 1d1061e230ea Step #0: ---> 1aa51232a47f Step #0: Removing intermediate container 1d1061e230ea Step #0: Step 6 : COPY build.sh $SRC/ Step #0: ---> 5e84ac3f7758 Step #0: Removing intermediate container c5b2529ecb95 Step #0: Successfully built 5e84ac3f7758 Finished Step #0 Step #1: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #1 Step #1: { Step #1: "/src/llvm_libcxxabi": { Step #1: "type": "svn", Step #1: "url": "https://llvm.org/svn/llvm-project/libcxxabi/trunk", Step #1: "rev": "298547" Step #1: }, Step #1: "/src": { Step #1: "type": "git", Step #1: "url": "https://github.com/google/oss-fuzz.git", Step #1: "rev": "60835ac4207d5877f119129a2a1e8639ee4b92a3" Step #1: } Step #1: } Finished Step #1 Step #2: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #2 Step #2: --------------------------------------------------------------- Step #2: ar: creating /usr/lib/libFuzzingEngine.a Step #2: Compiling libFuzzer to /usr/lib/libFuzzingEngine.a ... done. Step #2: CC=clang Step #2: CXX=clang++ Step #2: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp Step #2: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ Step #2: --------------------------------------------------------------- Step #2: + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -g src/cxa_demangle.cpp -Iinclude fuzz/cxa_demangle_fuzzer.cpp -o /workspace/out/address/cxa_demangle_fuzzer -lFuzzingEngine Finished Step #2 Step #3: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #3 Step #3: adding: cxa_demangle_fuzzer (deflated 73%) Finished Step #3 Step #4: Pulling image: gcr.io/clusterfuzz-external/uploader Step #4: Using default tag: latest Step #4: latest: Pulling from clusterfuzz-external/uploader Step #4: d54efb8db41d: Already exists Step #4: f8b845f45a87: Already exists Step #4: e8db7bf7c39f: Already exists Step #4: 9654c40e9079: Already exists Step #4: 6d9ef359eaaa: Already exists Step #4: c163cdd81561: Pulling fs layer Step #4: c69cfa74468c: Pulling fs layer Step #4: c69cfa74468c: Verifying Checksum Step #4: c69cfa74468c: Download complete Step #4: c163cdd81561: Verifying Checksum Step #4: c163cdd81561: Download complete Step #4: c163cdd81561: Pull complete Step #4: c69cfa74468c: Pull complete Step #4: Digest: sha256:d57ef7c6b5637cbb23e7bca5edb0928fe9c6030b7dc12190b295166f29ea6e40 Step #4: Status: Downloaded newer image for gcr.io/clusterfuzz-external/uploader:latest Starting Step #4 Step #4: % Total % Received % Xferd Average Speed Time Time Time Current Step #4: Dload Upload Total Spent Left Speed Step #4: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 3721k 0 0 100 3721k 0 5777k --:--:-- --:--:-- --:--:-- 5796k Finished Step #4 Step #5: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #5 Step #5: % Total % Received % Xferd Average Speed Time Time Time Current Step #5: Dload Upload Total Spent Left Speed Step #5: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 281 0 0 100 281 0 836 --:--:-- --:--:-- --:--:-- 836 Finished Step #5 Step #6: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #6 Finished Step #6 Step #7: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #7 Step #7: --------------------------------------------------------------- Step #7: ar: creating /usr/lib/libFuzzingEngine.a Step #7: Compiling libFuzzer to /usr/lib/libFuzzingEngine.a ... done. Step #7: CC=clang Step #7: CXX=clang++ Step #7: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp Step #7: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ Step #7: --------------------------------------------------------------- Step #7: + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=bool,function,signed-integer-overflow,shift,vla-bound,vptr -fno-sanitize-recover=undefined -fsanitize-coverage=trace-pc-guard,trace-cmp -stdlib=libc++ -std=c++11 -g src/cxa_demangle.cpp -Iinclude fuzz/cxa_demangle_fuzzer.cpp -o /workspace/out/undefined/cxa_demangle_fuzzer -lFuzzingEngine Finished Step #7 Step #8: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #8 Step #8: adding: cxa_demangle_fuzzer (deflated 71%) Finished Step #8 Step #9: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #9 Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 1426k 0 0 100 1426k 0 3203k --:--:-- --:--:-- --:--:-- 3204k Finished Step #9 Step #10: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #10 Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 281 0 0 100 281 0 730 --:--:-- --:--:-- --:--:-- 731 Finished Step #10 Step #11: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #11 Finished Step #11 Step #12: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #12 Step #12: --------------------------------------------------------------- Step #12: /src/afl/llvm_mode/afl-llvm-rt.o.c:67:7: warning: initializing 'u8 *' (aka 'unsigned char *') with an expression of type 'char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #12: u8 *id_str = getenv(SHM_ENV_VAR); Step #12: ^ ~~~~~~~~~~~~~~~~~~~ Step #12: /src/afl/llvm_mode/afl-llvm-rt.o.c:75:23: warning: passing 'u8 *' (aka 'unsigned char *') to parameter of type 'const char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #12: u32 shm_id = atoi(id_str); Step #12: ^~~~~~ Step #12: /usr/include/stdlib.h:278:26: note: passing argument to parameter '__nptr' here Step #12: __NTH (atoi (const char *__nptr)) Step #12: ^ Step #12: /src/afl/llvm_mode/afl-llvm-rt.o.c:283:5: warning: assigning to 'u8 *' (aka 'unsigned char *') from 'char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #12: x = getenv("AFL_INST_RATIO"); Step #12: ^ ~~~~~~~~~~~~~~~~~~~~~~~~ Step #12: /src/afl/llvm_mode/afl-llvm-rt.o.c:284:28: warning: passing 'u8 *' (aka 'unsigned char *') to parameter of type 'const char *' converts between pointers to integer types with different sign [-Wpointer-sign] Step #12: if (x) inst_ratio = atoi(x); Step #12: ^ Step #12: /usr/include/stdlib.h:278:26: note: passing argument to parameter '__nptr' here Step #12: __NTH (atoi (const char *__nptr)) Step #12: ^ Step #12: 4 warnings generated. Step #12: ar: creating /usr/lib/libFuzzingEngine.a Step #12: Compiling afl to /usr/lib/libFuzzingEngine.a ...rm -f afl-gcc afl-fuzz afl-showmap afl-tmin afl-gotcpu afl-analyze afl-as as afl-g++ afl-clang afl-clang++ *.o *~ a.out core core.[1-9][0-9]* *.stackdump test .test test-instr .test-instr0 .test-instr1 qemu_mode/qemu-2.3.0.tar.bz2 afl-qemu-trace Step #12: rm -rf out_dir qemu_mode/qemu-2.3.0 Step #12: make -C llvm_mode clean Step #12: make[1]: Entering directory '/src/afl/llvm_mode' Step #12: rm -f *.o *.so *~ a.out core core.[1-9][0-9]* test-instr .test-instr0 .test-instr1 Step #12: rm -f ../afl-clang-fast ../afl-llvm-pass.so ../afl-llvm-rt.o ../afl-llvm-rt-32.o ../afl-llvm-rt-64.o ../afl-clang-fast++ Step #12: make[1]: Leaving directory '/src/afl/llvm_mode' Step #12: make -C libdislocator clean Step #12: make[1]: Entering directory '/src/afl/libdislocator' Step #12: rm -f *.o *.so *~ a.out core core.[1-9][0-9]* Step #12: rm -f libdislocator.so Step #12: make[1]: Leaving directory '/src/afl/libdislocator' Step #12: make -C libtokencap clean Step #12: make[1]: Entering directory '/src/afl/libtokencap' Step #12: rm -f *.o *.so *~ a.out core core.[1-9][0-9]* Step #12: rm -f libtokencap.so Step #12: make[1]: Leaving directory '/src/afl/libtokencap' Step #12: [*] Checking for the ability to compile x86 code... Step #12: [+] Everything seems to be working, ready to compile. Step #12: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-gcc.c -o afl-gcc -ldl Step #12: set -e; for i in afl-g++ afl-clang afl-clang++; do ln -sf afl-gcc $i; done Step #12: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-fuzz.c -o afl-fuzz -ldl Step #12: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-showmap.c -o afl-showmap -ldl Step #12: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-tmin.c -o afl-tmin -ldl Step #12: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-gotcpu.c -o afl-gotcpu -ldl Step #12: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-analyze.c -o afl-analyze -ldl Step #12: clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" afl-as.c -o afl-as -ldl Step #12: ln -sf afl-as as Step #12: [*] Testing the CC wrapper and instrumentation output... Step #12: unset AFL_USE_ASAN AFL_USE_MSAN; AFL_QUIET=1 AFL_INST_RATIO=100 AFL_PATH=. ./afl-clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -Wall -D_FORTIFY_SOURCE=2 -g -Wno-pointer-sign -DAFL_PATH=\"/usr/local/lib/afl\" -DDOC_PATH=\"/usr/local/share/doc/afl\" -DBIN_PATH=\"/usr/local/bin\" test-instr.c -o test-instr -ldl Step #12: echo 0 | ./afl-showmap -m none -q -o .test-instr0 ./test-instr Step #12: echo 1 | ./afl-showmap -m none -q -o .test-instr1 ./test-instr Step #12: [+] All right, the instrumentation seems to be working! Step #12: [+] LLVM users: see llvm_mode/README.llvm for a faster alternative to afl-gcc. Step #12: [+] All done! Be sure to review README - it's pretty short and useful. Step #12: done. Step #12: CC=clang Step #12: CXX=clang++ Step #12: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard Step #12: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard -stdlib=libc++ Step #12: --------------------------------------------------------------- Step #12: + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard -stdlib=libc++ -std=c++11 -g src/cxa_demangle.cpp -Iinclude fuzz/cxa_demangle_fuzzer.cpp -o /workspace/out/address/cxa_demangle_fuzzer -lFuzzingEngine Finished Step #12 Step #13: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #13 Step #13: adding: afl-analyze (deflated 60%) Step #13: adding: afl-as (deflated 65%) Step #13: adding: afl-cmin (deflated 63%) Step #13: adding: afl-fuzz (deflated 59%) Step #13: adding: afl-gcc (deflated 65%) Step #13: adding: afl-gotcpu (deflated 63%) Step #13: adding: afl-plot (deflated 61%) Step #13: adding: afl-showmap (deflated 61%) Step #13: adding: afl-tmin (deflated 61%) Step #13: adding: afl-whatsup (deflated 58%) Step #13: adding: cxa_demangle_fuzzer (deflated 74%) Finished Step #13 Step #14: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #14 Step #14: % Total % Received % Xferd Average Speed Time Time Time Current Step #14: Dload Upload Total Spent Left Speed Step #14: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 3181k 0 0 100 3181k 0 3713k --:--:-- --:--:-- --:--:-- 3716k Finished Step #14 Step #15: Already have image (with digest): gcr.io/clusterfuzz-external/uploader Starting Step #15 Step #15: % Total % Received % Xferd Average Speed Time Time Time Current Step #15: Dload Upload Total Spent Left Speed Step #15: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 281 0 0 100 281 0 417 --:--:-- --:--:-- --:--:-- 417 100 281 0 0 100 281 0 417 --:--:-- --:--:-- --:--:-- 417 Finished Step #15 Step #16: Already have image: gcr.io/oss-fuzz/llvm_libcxxabi Starting Step #16 Finished Step #16 PUSH Pushing gcr.io/oss-fuzz/llvm_libcxxabi The push refers to a repository [gcr.io/oss-fuzz/llvm_libcxxabi] e65b7b9f1b72: Preparing e70dc662a63f: Preparing ffb3f5175154: Preparing bce5d7e0d7f6: Preparing a8aa4ef1f864: Preparing b1ec76bde71f: Preparing 24bf9f23a263: Preparing 89e1aff63a41: Preparing 9845e0494178: Preparing a8d7df2283e9: Preparing ff191fba4705: Preparing c942f3aa2fef: Preparing 919ce227defc: Preparing 56827159aa8b: Preparing 440e02c3dcde: Preparing 29660d0e5bb2: Preparing 85782553e37a: Preparing 745f5be9952c: Preparing a8d7df2283e9: Waiting ff191fba4705: Waiting 919ce227defc: Waiting 29660d0e5bb2: Waiting b1ec76bde71f: Waiting 56827159aa8b: Waiting 89e1aff63a41: Waiting c942f3aa2fef: Waiting 85782553e37a: Waiting 24bf9f23a263: Waiting 440e02c3dcde: Waiting 9845e0494178: Waiting 745f5be9952c: Waiting bce5d7e0d7f6: Mounted from oss-fuzz-base/base-builder a8aa4ef1f864: Mounted from oss-fuzz-base/base-builder b1ec76bde71f: Mounted from oss-fuzz-base/base-builder 24bf9f23a263: Mounted from oss-fuzz-base/base-builder 89e1aff63a41: Mounted from oss-fuzz-base/base-builder 9845e0494178: Mounted from oss-fuzz-base/base-builder a8d7df2283e9: Mounted from oss-fuzz-base/base-builder ff191fba4705: Mounted from oss-fuzz-base/base-builder c942f3aa2fef: Mounted from oss-fuzz-base/base-builder 919ce227defc: Mounted from oss-fuzz-base/base-builder ffb3f5175154: Pushed e65b7b9f1b72: Pushed e70dc662a63f: Pushed 56827159aa8b: Pushed 440e02c3dcde: Pushed 29660d0e5bb2: Pushed 85782553e37a: Pushed 745f5be9952c: Pushed latest: digest: sha256:85c79b0f548d3f5f43fe526da112648aab55bd50dbc74e7fa7f8446cf935b790 size: 4081 DONE