starting build "3371a2db-b248-4da9-a384-5550d43061e1" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 14.34kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: f39d80ca7021: Pulling fs layer Step #1: 3f7b104caa94: Pulling fs layer Step #1: 98d63d9f6c98: Pulling fs layer Step #1: 18e56a74fe3b: Pulling fs layer Step #1: d374a6bee675: Pulling fs layer Step #1: ec334fd6e8fa: Pulling fs layer Step #1: e3e240b0cd50: Pulling fs layer Step #1: b2512e0eab51: Pulling fs layer Step #1: 4223d1ba77d3: Pulling fs layer Step #1: ec334fd6e8fa: Waiting Step #1: 8d45a907f5ae: Pulling fs layer Step #1: d374a6bee675: Waiting Step #1: 44ae4f1bee4d: Pulling fs layer Step #1: 5e1d39d83edd: Pulling fs layer Step #1: 18e56a74fe3b: Waiting Step #1: 98d63d9f6c98: Waiting Step #1: 96c98dcd7e17: Pulling fs layer Step #1: 136e28fc29c9: Pulling fs layer Step #1: af65c42a8b64: Pulling fs layer Step #1: a144ab822a62: Pulling fs layer Step #1: bcbe3735701b: Pulling fs layer Step #1: efddb1001a19: Pulling fs layer Step #1: f2e49f1ff49e: Pulling fs layer Step #1: 2f0cc467e898: Pulling fs layer Step #1: b1b7efa61c06: Pulling fs layer Step #1: 64c91e3d268f: Pulling fs layer Step #1: 731f380c2ff1: Pulling fs layer Step #1: fd03b6508997: Pulling fs layer Step #1: ff008d189a82: Pulling fs layer Step #1: 29aa799e57e6: Pulling fs layer Step #1: 44ae4f1bee4d: Waiting Step #1: 136e28fc29c9: Waiting Step #1: af65c42a8b64: Waiting Step #1: ae08d37ab679: Pulling fs layer Step #1: 5e1d39d83edd: Waiting Step #1: 35fa612f5131: Pulling fs layer Step #1: a144ab822a62: Waiting Step #1: bcbe3735701b: Waiting Step #1: 96c98dcd7e17: Waiting Step #1: ff008d189a82: Waiting Step #1: 11c964e3f593: Pulling fs layer Step #1: 4e7bf651b6b4: Pulling fs layer Step #1: 7b105a7ee1bc: Pulling fs layer Step #1: 729758dd3f83: Pulling fs layer Step #1: c744ce97d41c: Pulling fs layer Step #1: 4e7bf651b6b4: Waiting Step #1: f2e49f1ff49e: Waiting Step #1: b1b7efa61c06: Waiting Step #1: 7b105a7ee1bc: Waiting Step #1: 64c91e3d268f: Waiting Step #1: 729758dd3f83: Waiting Step #1: c744ce97d41c: Waiting Step #1: 8d45a907f5ae: Waiting Step #1: 35fa612f5131: Waiting Step #1: ae08d37ab679: Waiting Step #1: 11c964e3f593: Waiting Step #1: b2512e0eab51: Waiting Step #1: 731f380c2ff1: Waiting Step #1: e3e240b0cd50: Waiting Step #1: fd03b6508997: Waiting Step #1: efddb1001a19: Waiting Step #1: 3f7b104caa94: Verifying Checksum Step #1: 3f7b104caa94: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 98d63d9f6c98: Verifying Checksum Step #1: 98d63d9f6c98: Download complete Step #1: 18e56a74fe3b: Download complete Step #1: d374a6bee675: Verifying Checksum Step #1: d374a6bee675: Download complete Step #1: e3e240b0cd50: Verifying Checksum Step #1: e3e240b0cd50: Download complete Step #1: f39d80ca7021: Verifying Checksum Step #1: f39d80ca7021: Download complete Step #1: b2512e0eab51: Verifying Checksum Step #1: b2512e0eab51: Download complete Step #1: b549f31133a9: Pull complete Step #1: 8d45a907f5ae: Verifying Checksum Step #1: 8d45a907f5ae: Download complete Step #1: 44ae4f1bee4d: Verifying Checksum Step #1: 44ae4f1bee4d: Download complete Step #1: 5e1d39d83edd: Verifying Checksum Step #1: 5e1d39d83edd: Download complete Step #1: 96c98dcd7e17: Verifying Checksum Step #1: 96c98dcd7e17: Download complete Step #1: 4223d1ba77d3: Verifying Checksum Step #1: 4223d1ba77d3: Download complete Step #1: 136e28fc29c9: Verifying Checksum Step #1: 136e28fc29c9: Download complete Step #1: af65c42a8b64: Verifying Checksum Step #1: af65c42a8b64: Download complete Step #1: a144ab822a62: Verifying Checksum Step #1: a144ab822a62: Download complete Step #1: bcbe3735701b: Verifying Checksum Step #1: bcbe3735701b: Download complete Step #1: efddb1001a19: Verifying Checksum Step #1: efddb1001a19: Download complete Step #1: f2e49f1ff49e: Verifying Checksum Step #1: f2e49f1ff49e: Download complete Step #1: 2f0cc467e898: Verifying Checksum Step #1: 2f0cc467e898: Download complete Step #1: b1b7efa61c06: Verifying Checksum Step #1: b1b7efa61c06: Download complete Step #1: ec334fd6e8fa: Verifying Checksum Step #1: ec334fd6e8fa: Download complete Step #1: 64c91e3d268f: Verifying Checksum Step #1: 64c91e3d268f: Download complete Step #1: 731f380c2ff1: Verifying Checksum Step #1: 731f380c2ff1: Download complete Step #1: fd03b6508997: Verifying Checksum Step #1: fd03b6508997: Download complete Step #1: 29aa799e57e6: Verifying Checksum Step #1: 29aa799e57e6: Download complete Step #1: ff008d189a82: Verifying Checksum Step #1: ff008d189a82: Download complete Step #1: ae08d37ab679: Verifying Checksum Step #1: ae08d37ab679: Download complete Step #1: 35fa612f5131: Verifying Checksum Step #1: 35fa612f5131: Download complete Step #1: 11c964e3f593: Verifying Checksum Step #1: 11c964e3f593: Download complete Step #1: 4e7bf651b6b4: Verifying Checksum Step #1: 4e7bf651b6b4: Download complete Step #1: 7b105a7ee1bc: Download complete Step #1: f39d80ca7021: Pull complete Step #1: c744ce97d41c: Download complete Step #1: 729758dd3f83: Verifying Checksum Step #1: 729758dd3f83: Download complete Step #1: 3f7b104caa94: Pull complete Step #1: 98d63d9f6c98: Pull complete Step #1: 18e56a74fe3b: Pull complete Step #1: d374a6bee675: Pull complete Step #1: ec334fd6e8fa: Pull complete Step #1: e3e240b0cd50: Pull complete Step #1: b2512e0eab51: Pull complete Step #1: 4223d1ba77d3: Pull complete Step #1: 8d45a907f5ae: Pull complete Step #1: 44ae4f1bee4d: Pull complete Step #1: 5e1d39d83edd: Pull complete Step #1: 96c98dcd7e17: Pull complete Step #1: 136e28fc29c9: Pull complete Step #1: af65c42a8b64: Pull complete Step #1: a144ab822a62: Pull complete Step #1: bcbe3735701b: Pull complete Step #1: efddb1001a19: Pull complete Step #1: f2e49f1ff49e: Pull complete Step #1: 2f0cc467e898: Pull complete Step #1: b1b7efa61c06: Pull complete Step #1: 64c91e3d268f: Pull complete Step #1: 731f380c2ff1: Pull complete Step #1: fd03b6508997: Pull complete Step #1: ff008d189a82: Pull complete Step #1: 29aa799e57e6: Pull complete Step #1: ae08d37ab679: Pull complete Step #1: 35fa612f5131: Pull complete Step #1: 11c964e3f593: Pull complete Step #1: 4e7bf651b6b4: Pull complete Step #1: 7b105a7ee1bc: Pull complete Step #1: 729758dd3f83: Pull complete Step #1: c744ce97d41c: Pull complete Step #1: Digest: sha256:35a7e82a227062d56e171abbfd7d5434e01fb0e57a9e4f5e4c881bc319cbe9be Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 5f32d8731ed3 Step #1: Step 2/7 : RUN apt-get update && apt-get install -y automake autotools-dev bsdmainutils build-essential cmake curl g++-multilib libtool make patch pkg-config python3 wget zip Step #1: ---> Running in 3a9fa40ae2f2 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (751 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: patch is already the newest version (2.7.6-6). Step #1: patch set to manually installed. Step #1: zip is already the newest version (3.0-11build1). Step #1: build-essential is already the newest version (12.8ubuntu1.1). Step #1: curl is already the newest version (7.68.0-1ubuntu2.25). Step #1: wget is already the newest version (1.20.3-1ubuntu2.1). Step #1: The following additional packages will be installed: Step #1: autoconf cmake-data file g++-9-multilib lib32stdc++-9-dev libarchive13 Step #1: libglib2.0-0 libglib2.0-data libicu66 libjsoncpp1 libltdl-dev libltdl7 Step #1: libmagic-mgc libmagic1 libmpdec2 libpython3-stdlib libpython3.8-minimal Step #1: libpython3.8-stdlib librhash0 libsigsegv2 libuv1 libx32stdc++-9-dev libxml2 Step #1: m4 mime-support python3-minimal python3.8 python3.8-minimal shared-mime-info Step #1: xdg-user-dirs Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext wamerican | wordlist Step #1: whois vacation cmake-doc ninja-build lib32stdc++6-9-dbg libx32stdc++6-9-dbg Step #1: lrzip libtool-doc gfortran | fortran95-compiler gcj-jdk m4-doc python3-doc Step #1: python3-tk python3-venv python3.8-venv python3.8-doc binfmt-support Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev bsdmainutils cmake cmake-data file Step #1: g++-9-multilib g++-multilib lib32stdc++-9-dev libarchive13 libglib2.0-0 Step #1: libglib2.0-data libicu66 libjsoncpp1 libltdl-dev libltdl7 libmagic-mgc Step #1: libmagic1 libmpdec2 libpython3-stdlib libpython3.8-minimal Step #1: libpython3.8-stdlib librhash0 libsigsegv2 libtool libuv1 libx32stdc++-9-dev Step #1: libxml2 m4 mime-support pkg-config python3 python3-minimal python3.8 Step #1: python3.8-minimal shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 38 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 25.2 MB of archives. Step #1: After this operation, 127 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.14 [720 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.14 [1899 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.14 [1675 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.14 [387 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.8 [1289 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.8 [5848 B] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/main amd64 bsdmainutils amd64 11.1.2ubuntu3 [181 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.4 [327 kB] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 lib32stdc++-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [762 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libx32stdc++-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [709 kB] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 g++-9-multilib amd64 9.4.0-1ubuntu1~20.04.2 [1084 B] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal/main amd64 g++-multilib amd64 4:9.3.0-1ubuntu2 [1044 B] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 25.2 MB in 1s (38.9 MB/s) Step #1: Selecting previously unselected package libpython3.8-minimal:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.14_amd64.deb ... Step #1: Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.14) ... Step #1: Selecting previously unselected package python3.8-minimal. Step #1: Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.14_amd64.deb ... Step #1: Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.14) ... Step #1: Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.14) ... Step #1: Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.14) ... Step #1: Selecting previously unselected package python3-minimal. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17676 files and directories currently installed.) Step #1: Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libmpdec2:amd64. Step #1: Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #1: Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #1: Selecting previously unselected package libpython3.8-stdlib:amd64. Step #1: Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.14_amd64.deb ... Step #1: Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.14) ... Step #1: Selecting previously unselected package python3.8. Step #1: Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.14_amd64.deb ... Step #1: Unpacking python3.8 (3.8.10-0ubuntu1~20.04.14) ... Step #1: Selecting previously unselected package libpython3-stdlib:amd64. Step #1: Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package python3. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18078 files and directories currently installed.) Step #1: Preparing to unpack .../00-python3_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3 (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../01-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../02-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../03-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../04-libglib2.0-0_2.64.6-1~ubuntu20.04.8_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../05-libglib2.0-data_2.64.6-1~ubuntu20.04.8_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../06-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../07-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../08-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../09-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package bsdmainutils. Step #1: Preparing to unpack .../10-bsdmainutils_11.1.2ubuntu3_amd64.deb ... Step #1: Unpacking bsdmainutils (11.1.2ubuntu3) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../11-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../12-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../13-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../14-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../15-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../16-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../17-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../18-libarchive13_3.4.0-2ubuntu1.4_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../19-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../20-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../21-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package lib32stdc++-9-dev. Step #1: Preparing to unpack .../22-lib32stdc++-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking lib32stdc++-9-dev (9.4.0-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package libx32stdc++-9-dev. Step #1: Preparing to unpack .../23-libx32stdc++-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libx32stdc++-9-dev (9.4.0-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package g++-9-multilib. Step #1: Preparing to unpack .../24-g++-9-multilib_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking g++-9-multilib (9.4.0-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package g++-multilib. Step #1: Preparing to unpack .../25-g++-multilib_4%3a9.3.0-1ubuntu2_amd64.deb ... Step #1: Unpacking g++-multilib (4:9.3.0-1ubuntu2) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../26-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../27-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../28-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../29-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up lib32stdc++-9-dev (9.4.0-1ubuntu1~20.04.2) ... Step #1: Setting up libx32stdc++-9-dev (9.4.0-1ubuntu1~20.04.2) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up g++-9-multilib (9.4.0-1ubuntu1~20.04.2) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up bsdmainutils (11.1.2ubuntu3) ... Step #1: update-alternatives: using /usr/bin/bsd-write to provide /usr/bin/write (write) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/write.1.gz because associated file /usr/share/man/man1/bsd-write.1.gz (of link group write) doesn't exist Step #1: update-alternatives: using /usr/bin/bsd-from to provide /usr/bin/from (from) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/from.1.gz because associated file /usr/share/man/man1/bsd-from.1.gz (of link group from) doesn't exist Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libmpdec2:amd64 (2.4.2-3) ... Step #1: Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.14) ... Step #1: Setting up python3.8 (3.8.10-0ubuntu1~20.04.14) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Setting up g++-multilib (4:9.3.0-1ubuntu2) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up python3 (3.8.2-0ubuntu2) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 3a9fa40ae2f2 Step #1: ---> 72edf79f8db3 Step #1: Step 3/7 : RUN git clone --depth=1 https://github.com/bitcoin/bitcoin.git bitcoin-core Step #1: ---> Running in 68b408844efe Step #1: Cloning into 'bitcoin-core'... Step #1: Removing intermediate container 68b408844efe Step #1: ---> 5c54dee98de2 Step #1: Step 4/7 : RUN git clone --depth=1 https://github.com/bitcoin-core/qa-assets bitcoin-core/assets && rm -rf bitcoin-core/assets/.git # Remove git history to save storage Step #1: ---> Running in e470d1bc329a Step #1: Cloning into 'bitcoin-core/assets'... Step #1: Updating files: 3% (6846/179074) Updating files: 4% (7163/179074) Updating files: 5% (8954/179074) Updating files: 6% (10745/179074) Updating files: 7% (12536/179074) Updating files: 8% (14326/179074) Updating files: 8% (15395/179074) Updating files: 9% (16117/179074) Updating files: 10% (17908/179074) Updating files: 10% (19353/179074) Updating files: 11% (19699/179074) Updating files: 12% (21489/179074) Updating files: 13% (23280/179074) Updating files: 14% (25071/179074) Updating files: 15% (26862/179074) Updating files: 16% (28652/179074) Updating files: 17% (30443/179074) Updating files: 17% (30866/179074) Updating files: 18% (32234/179074) Updating files: 19% (34025/179074) Updating files: 20% (35815/179074) Updating files: 20% (36953/179074) Updating files: 21% (37606/179074) Updating files: 21% (39067/179074) Updating files: 22% (39397/179074) Updating files: 23% (41188/179074) Updating files: 24% (42978/179074) Updating files: 25% (44769/179074) Updating files: 26% (46560/179074) Updating files: 27% (48350/179074) Updating files: 28% (50141/179074) Updating files: 29% (51932/179074) Updating files: 29% (51943/179074) Updating files: 30% (53723/179074) Updating files: 31% (55513/179074) Updating files: 32% (57304/179074) Updating files: 33% (59095/179074) Updating files: 34% (60886/179074) Updating files: 35% (62676/179074) Updating files: 35% (63276/179074) Updating files: 36% (64467/179074) Updating files: 37% (66258/179074) Updating files: 38% (68049/179074) Updating files: 39% (69839/179074) Updating files: 40% (71630/179074) Updating files: 41% (73421/179074) Updating files: 42% (75212/179074) Updating files: 42% (76286/179074) Updating files: 43% (77002/179074) Updating files: 44% (78793/179074) Updating files: 45% (80584/179074) Updating files: 46% (82375/179074) Updating files: 47% (84165/179074) Updating files: 48% (85956/179074) Updating files: 48% (86779/179074) Updating files: 49% (87747/179074) Updating files: 50% (89537/179074) Updating files: 51% (91328/179074) Updating files: 52% (93119/179074) Updating files: 52% (93822/179074) Updating files: 53% (94910/179074) Updating files: 54% (96700/179074) Updating files: 55% (98491/179074) Updating files: 56% (100282/179074) Updating files: 56% (100298/179074) Updating files: 57% (102073/179074) Updating files: 58% (103863/179074) Updating files: 59% (105654/179074) Updating files: 60% (107445/179074) Updating files: 61% (109236/179074) Updating files: 62% (111026/179074) Updating files: 62% (112106/179074) Updating files: 63% (112817/179074) Updating files: 64% (114608/179074) Updating files: 65% (116399/179074) Updating files: 66% (118189/179074) Updating files: 67% (119980/179074) Updating files: 67% (120555/179074) Updating files: 68% (121771/179074) Updating files: 69% (123562/179074) Updating files: 70% (125352/179074) Updating files: 71% (127143/179074) Updating files: 72% (128934/179074) Updating files: 73% (130725/179074) Updating files: 73% (132335/179074) Updating files: 74% (132515/179074) Updating files: 75% (134306/179074) Updating files: 76% (136097/179074) Updating files: 77% (137887/179074) Updating files: 77% (139105/179074) Updating files: 78% (139678/179074) Updating files: 79% (141469/179074) Updating files: 80% (143260/179074) Updating files: 81% (145050/179074) Updating files: 82% (146841/179074) Updating files: 83% (148632/179074) Updating files: 84% (150423/179074) Updating files: 84% (151511/179074) Updating files: 85% (152213/179074) Updating files: 86% (154004/179074) Updating files: 87% (155795/179074) Updating files: 88% (157586/179074) Updating files: 89% (159376/179074) Updating files: 89% (159787/179074) Updating files: 90% (161167/179074) Updating files: 91% (162958/179074) Updating files: 92% (164749/179074) Updating files: 93% (166539/179074) Updating files: 94% (168330/179074) Updating files: 95% (170121/179074) Updating files: 95% (170651/179074) Updating files: 96% (171912/179074) Updating files: 97% (173702/179074) Updating files: 98% (175493/179074) Updating files: 99% (177284/179074) Updating files: 100% (179074/179074) Updating files: 100% (179074/179074), done. Step #1: Removing intermediate container e470d1bc329a Step #1: ---> 0e6b189d5731 Step #1: Step 5/7 : RUN git clone --depth 1 https://github.com/bitcoin-core/secp256k1.git Step #1: ---> Running in 0daee1987b73 Step #1: Cloning into 'secp256k1'... Step #1: Removing intermediate container 0daee1987b73 Step #1: ---> 537d7b9d848f Step #1: Step 6/7 : WORKDIR bitcoin-core Step #1: ---> Running in eb6bbfdbe036 Step #1: Removing intermediate container eb6bbfdbe036 Step #1: ---> b22fbdc08d6d Step #1: Step 7/7 : COPY build.sh $SRC/ Step #1: ---> 003dbfa3be87 Step #1: Successfully built 003dbfa3be87 Step #1: Successfully tagged gcr.io/oss-fuzz/bitcoin-core:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/bitcoin-core Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileSXzLcM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/secp256k1/.git Step #2 - "srcmap": + GIT_DIR=/src/secp256k1 Step #2 - "srcmap": + cd /src/secp256k1 Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/bitcoin-core/secp256k1.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f79f46c70386c693ff4e7aef0b9e7923ba284e56 Step #2 - "srcmap": + jq_inplace /tmp/fileSXzLcM '."/src/secp256k1" = { type: "git", url: "https://github.com/bitcoin-core/secp256k1.git", rev: "f79f46c70386c693ff4e7aef0b9e7923ba284e56" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filePhwu69 Step #2 - "srcmap": + cat /tmp/fileSXzLcM Step #2 - "srcmap": + jq '."/src/secp256k1" = { type: "git", url: "https://github.com/bitcoin-core/secp256k1.git", rev: "f79f46c70386c693ff4e7aef0b9e7923ba284e56" }' Step #2 - "srcmap": + mv /tmp/filePhwu69 /tmp/fileSXzLcM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/bitcoin-core/.git Step #2 - "srcmap": + GIT_DIR=/src/bitcoin-core Step #2 - "srcmap": + cd /src/bitcoin-core Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/bitcoin/bitcoin.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d5a2ba44ba4f23fcf3b3408d28438b7c7013ba36 Step #2 - "srcmap": + jq_inplace /tmp/fileSXzLcM '."/src/bitcoin-core" = { type: "git", url: "https://github.com/bitcoin/bitcoin.git", rev: "d5a2ba44ba4f23fcf3b3408d28438b7c7013ba36" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filehsCiDJ Step #2 - "srcmap": + cat /tmp/fileSXzLcM Step #2 - "srcmap": + jq '."/src/bitcoin-core" = { type: "git", url: "https://github.com/bitcoin/bitcoin.git", rev: "d5a2ba44ba4f23fcf3b3408d28438b7c7013ba36" }' Step #2 - "srcmap": + mv /tmp/filehsCiDJ /tmp/fileSXzLcM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileSXzLcM Step #2 - "srcmap": + rm /tmp/fileSXzLcM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/secp256k1": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/bitcoin-core/secp256k1.git", Step #2 - "srcmap": "rev": "f79f46c70386c693ff4e7aef0b9e7923ba284e56" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/bitcoin-core": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/bitcoin/bitcoin.git", Step #2 - "srcmap": "rev": "d5a2ba44ba4f23fcf3b3408d28438b7c7013ba36" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + date Step #3 - "compile-libfuzzer-coverage-x86_64": Fri Jan 24 06:23:35 UTC 2025 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/bitcoin-core/ Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' x86_64 = i386 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + export BUILD_TRIPLET=x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": + BUILD_TRIPLET=x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CPPFLAGS=-D_LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_DEBUG -DBOOST_MULTI_INDEX_ENABLE_SAFE_MODE' Step #3 - "compile-libfuzzer-coverage-x86_64": + CPPFLAGS='-D_LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_DEBUG -DBOOST_MULTI_INDEX_ENABLE_SAFE_MODE' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd depends Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i --regexp-extended '/.*rm -rf .*extract_dir.*/d' ./funcs.mk Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make HOST=x86_64-pc-linux-gnu DEBUG=1 NO_QT=1 NO_BDB=1 NO_ZMQ=1 NO_USDT=1 AR=llvm-ar NM=llvm-nm RANLIB=llvm-ranlib STRIP=llvm-strip -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN ALL Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN ID SALT Step #3 - "compile-libfuzzer-coverage-x86_64": salt GUIX_ENVIRONMENT= Step #3 - "compile-libfuzzer-coverage-x86_64": END ID SALT Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN FLAGS Step #3 - "compile-libfuzzer-coverage-x86_64": CPPFLAGS=-D_LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_DEBUG -DBOOST_MULTI_INDEX_ENABLE_SAFE_MODE Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": LDFLAGS= Step #3 - "compile-libfuzzer-coverage-x86_64": END FLAGS Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN CC Step #3 - "compile-libfuzzer-coverage-x86_64": Using built-in specs. Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC=gcc Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_LTO_WRAPPER=/usr/lib/gcc/x86_64-linux-gnu/9/lto-wrapper Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_NAMES=nvptx-none:hsa Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_DEFAULT=1 Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Configured with: ../src/configure -v --with-pkgversion='Ubuntu 9.4.0-1ubuntu1~20.04.2' --with-bugurl=file:///usr/share/doc/gcc-9/README.Bugs --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --prefix=/usr --with-gcc-major-version-only --program-suffix=-9 --program-prefix=x86_64-linux-gnu- --enable-shared --enable-linker-build-id --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --libdir=/usr/lib --enable-nls --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --with-default-libstdcxx-abi=new --enable-gnu-unique-object --disable-vtable-verify --enable-plugin --enable-default-pie --with-system-zlib --with-target-system-zlib=auto --enable-objc-gc=auto --enable-multiarch --disable-werror --with-arch-32=i686 --with-abi=m64 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --without-cuda-driver --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) Step #3 - "compile-libfuzzer-coverage-x86_64": Using built-in specs. Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC=gcc Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_NAMES=nvptx-none:hsa Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_DEFAULT=1 Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Configured with: ../src/configure -v --with-pkgversion='Ubuntu 9.4.0-1ubuntu1~20.04.2' --with-bugurl=file:///usr/share/doc/gcc-9/README.Bugs --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --prefix=/usr --with-gcc-major-version-only --program-suffix=-9 --program-prefix=x86_64-linux-gnu- --enable-shared --enable-linker-build-id --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --libdir=/usr/lib --enable-nls --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --with-default-libstdcxx-abi=new --enable-gnu-unique-object --disable-vtable-verify --enable-plugin --enable-default-pie --with-system-zlib --with-target-system-zlib=auto --enable-objc-gc=auto --enable-multiarch --disable-werror --with-arch-32=i686 --with-abi=m64 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --without-cuda-driver --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC_OPTIONS='-v' '-E' '-o' '/dev/null' '-mtune=generic' '-march=x86-64' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/cc1 -E -quiet -v -imultiarch x86_64-linux-gnu - -o /dev/null -mtune=generic -march=x86-64 -fasynchronous-unwind-tables -fstack-protector-strong -Wformat -Wformat-security -fstack-clash-protection -fcf-protection Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/local/include/x86_64-linux-gnu" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/include-fixed" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include" Step #3 - "compile-libfuzzer-coverage-x86_64": #include "..." search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": #include <...> search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include Step #3 - "compile-libfuzzer-coverage-x86_64": End of search list. Step #3 - "compile-libfuzzer-coverage-x86_64": COMPILER_PATH=/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/:/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/ Step #3 - "compile-libfuzzer-coverage-x86_64": LIBRARY_PATH=/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/9/../../../x86_64-linux-gnu/:/usr/lib/gcc/x86_64-linux-gnu/9/../../../../lib/:/lib/x86_64-linux-gnu/:/lib/../lib/:/usr/lib/x86_64-linux-gnu/:/usr/lib/../lib/:/usr/lib/gcc/x86_64-linux-gnu/9/../../../:/lib/:/usr/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC_OPTIONS='-v' '-E' '-o' '/dev/null' '-mtune=generic' '-march=x86-64' Step #3 - "compile-libfuzzer-coverage-x86_64": Using built-in specs. Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC=gcc Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_NAMES=nvptx-none:hsa Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_DEFAULT=1 Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Configured with: ../src/configure -v --with-pkgversion='Ubuntu 9.4.0-1ubuntu1~20.04.2' --with-bugurl=file:///usr/share/doc/gcc-9/README.Bugs --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --prefix=/usr --with-gcc-major-version-only --program-suffix=-9 --program-prefix=x86_64-linux-gnu- --enable-shared --enable-linker-build-id --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --libdir=/usr/lib --enable-nls --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --with-default-libstdcxx-abi=new --enable-gnu-unique-object --disable-vtable-verify --enable-plugin --enable-default-pie --with-system-zlib --with-target-system-zlib=auto --enable-objc-gc=auto --enable-multiarch --disable-werror --with-arch-32=i686 --with-abi=m64 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --without-cuda-driver --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC_OPTIONS='-v' '-E' '-o' '/dev/null' '-mtune=generic' '-march=x86-64' Step #3 - "compile-libfuzzer-coverage-x86_64": cc1obj -E -quiet -v -imultiarch x86_64-linux-gnu - -o /dev/null -mtune=generic -march=x86-64 -fasynchronous-unwind-tables -fstack-protector-strong -Wformat -Wformat-security -fstack-clash-protection -fcf-protection Step #3 - "compile-libfuzzer-coverage-x86_64": gcc: fatal error: cannot execute 'cc1obj': execvp: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": compilation terminated. Step #3 - "compile-libfuzzer-coverage-x86_64": C_STANDARD=c11 Step #3 - "compile-libfuzzer-coverage-x86_64": END CC Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN CXX Step #3 - "compile-libfuzzer-coverage-x86_64": Using built-in specs. Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC=g++ Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_LTO_WRAPPER=/usr/lib/gcc/x86_64-linux-gnu/9/lto-wrapper Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_NAMES=nvptx-none:hsa Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_DEFAULT=1 Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Configured with: ../src/configure -v --with-pkgversion='Ubuntu 9.4.0-1ubuntu1~20.04.2' --with-bugurl=file:///usr/share/doc/gcc-9/README.Bugs --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --prefix=/usr --with-gcc-major-version-only --program-suffix=-9 --program-prefix=x86_64-linux-gnu- --enable-shared --enable-linker-build-id --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --libdir=/usr/lib --enable-nls --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --with-default-libstdcxx-abi=new --enable-gnu-unique-object --disable-vtable-verify --enable-plugin --enable-default-pie --with-system-zlib --with-target-system-zlib=auto --enable-objc-gc=auto --enable-multiarch --disable-werror --with-arch-32=i686 --with-abi=m64 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --without-cuda-driver --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) Step #3 - "compile-libfuzzer-coverage-x86_64": Using built-in specs. Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC=g++ Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_NAMES=nvptx-none:hsa Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_DEFAULT=1 Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Configured with: ../src/configure -v --with-pkgversion='Ubuntu 9.4.0-1ubuntu1~20.04.2' --with-bugurl=file:///usr/share/doc/gcc-9/README.Bugs --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --prefix=/usr --with-gcc-major-version-only --program-suffix=-9 --program-prefix=x86_64-linux-gnu- --enable-shared --enable-linker-build-id --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --libdir=/usr/lib --enable-nls --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --with-default-libstdcxx-abi=new --enable-gnu-unique-object --disable-vtable-verify --enable-plugin --enable-default-pie --with-system-zlib --with-target-system-zlib=auto --enable-objc-gc=auto --enable-multiarch --disable-werror --with-arch-32=i686 --with-abi=m64 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --without-cuda-driver --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC_OPTIONS='-v' '-E' '-o' '/dev/null' '-shared-libgcc' '-mtune=generic' '-march=x86-64' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/cc1plus -E -quiet -v -imultiarch x86_64-linux-gnu -D_GNU_SOURCE - -o /dev/null -mtune=generic -march=x86-64 -fasynchronous-unwind-tables -fstack-protector-strong -Wformat -Wformat-security -fstack-clash-protection -fcf-protection Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring duplicate directory "/usr/include/x86_64-linux-gnu/c++/9" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/local/include/x86_64-linux-gnu" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/include-fixed" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include" Step #3 - "compile-libfuzzer-coverage-x86_64": #include "..." search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": #include <...> search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/c++/9 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/x86_64-linux-gnu/c++/9 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/c++/9/backward Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include Step #3 - "compile-libfuzzer-coverage-x86_64": End of search list. Step #3 - "compile-libfuzzer-coverage-x86_64": COMPILER_PATH=/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/:/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/ Step #3 - "compile-libfuzzer-coverage-x86_64": LIBRARY_PATH=/usr/lib/gcc/x86_64-linux-gnu/9/:/usr/lib/gcc/x86_64-linux-gnu/9/../../../x86_64-linux-gnu/:/usr/lib/gcc/x86_64-linux-gnu/9/../../../../lib/:/lib/x86_64-linux-gnu/:/lib/../lib/:/usr/lib/x86_64-linux-gnu/:/usr/lib/../lib/:/usr/lib/gcc/x86_64-linux-gnu/9/../../../:/lib/:/usr/lib/ Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC_OPTIONS='-v' '-E' '-o' '/dev/null' '-shared-libgcc' '-mtune=generic' '-march=x86-64' Step #3 - "compile-libfuzzer-coverage-x86_64": Using built-in specs. Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC=g++ Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_NAMES=nvptx-none:hsa Step #3 - "compile-libfuzzer-coverage-x86_64": OFFLOAD_TARGET_DEFAULT=1 Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Configured with: ../src/configure -v --with-pkgversion='Ubuntu 9.4.0-1ubuntu1~20.04.2' --with-bugurl=file:///usr/share/doc/gcc-9/README.Bugs --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --prefix=/usr --with-gcc-major-version-only --program-suffix=-9 --program-prefix=x86_64-linux-gnu- --enable-shared --enable-linker-build-id --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --libdir=/usr/lib --enable-nls --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --with-default-libstdcxx-abi=new --enable-gnu-unique-object --disable-vtable-verify --enable-plugin --enable-default-pie --with-system-zlib --with-target-system-zlib=auto --enable-objc-gc=auto --enable-multiarch --disable-werror --with-arch-32=i686 --with-abi=m64 --with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --without-cuda-driver --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) Step #3 - "compile-libfuzzer-coverage-x86_64": COLLECT_GCC_OPTIONS='-v' '-E' '-o' '/dev/null' '-shared-libgcc' '-mtune=generic' '-march=x86-64' Step #3 - "compile-libfuzzer-coverage-x86_64": cc1objplus -E -quiet -v -imultiarch x86_64-linux-gnu -D_GNU_SOURCE - -o /dev/null -mtune=generic -march=x86-64 -fasynchronous-unwind-tables -fstack-protector-strong -Wformat -Wformat-security -fstack-clash-protection -fcf-protection Step #3 - "compile-libfuzzer-coverage-x86_64": g++: fatal error: cannot execute 'cc1objplus': execvp: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": compilation terminated. Step #3 - "compile-libfuzzer-coverage-x86_64": CXX_STANDARD=c++20 Step #3 - "compile-libfuzzer-coverage-x86_64": END CXX Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN lld Step #3 - "compile-libfuzzer-coverage-x86_64": LLD 18.1.8 (compatible with GNU linkers) Step #3 - "compile-libfuzzer-coverage-x86_64": END lld Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN mold Step #3 - "compile-libfuzzer-coverage-x86_64": bash: mold: command not found Step #3 - "compile-libfuzzer-coverage-x86_64": END mold Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN AR Step #3 - "compile-libfuzzer-coverage-x86_64": GNU ar (GNU Binutils for Ubuntu) 2.34 Step #3 - "compile-libfuzzer-coverage-x86_64": Copyright (C) 2020 Free Software Foundation, Inc. Step #3 - "compile-libfuzzer-coverage-x86_64": This program is free software; you may redistribute it under the terms of Step #3 - "compile-libfuzzer-coverage-x86_64": the GNU General Public License version 3 or (at your option) any later version. Step #3 - "compile-libfuzzer-coverage-x86_64": This program has absolutely no warranty. Step #3 - "compile-libfuzzer-coverage-x86_64": END AR Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN NM Step #3 - "compile-libfuzzer-coverage-x86_64": GNU nm (GNU Binutils for Ubuntu) 2.34 Step #3 - "compile-libfuzzer-coverage-x86_64": Copyright (C) 2020 Free Software Foundation, Inc. Step #3 - "compile-libfuzzer-coverage-x86_64": This program is free software; you may redistribute it under the terms of Step #3 - "compile-libfuzzer-coverage-x86_64": the GNU General Public License version 3 or (at your option) any later version. Step #3 - "compile-libfuzzer-coverage-x86_64": This program has absolutely no warranty. Step #3 - "compile-libfuzzer-coverage-x86_64": END NM Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN RANLIB Step #3 - "compile-libfuzzer-coverage-x86_64": GNU ranlib (GNU Binutils for Ubuntu) 2.34 Step #3 - "compile-libfuzzer-coverage-x86_64": Copyright (C) 2020 Free Software Foundation, Inc. Step #3 - "compile-libfuzzer-coverage-x86_64": This program is free software; you may redistribute it under the terms of Step #3 - "compile-libfuzzer-coverage-x86_64": the GNU General Public License version 3 or (at your option) any later version. Step #3 - "compile-libfuzzer-coverage-x86_64": This program has absolutely no warranty. Step #3 - "compile-libfuzzer-coverage-x86_64": END RANLIB Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN STRIP Step #3 - "compile-libfuzzer-coverage-x86_64": GNU strip (GNU Binutils for Ubuntu) 2.34 Step #3 - "compile-libfuzzer-coverage-x86_64": Copyright (C) 2020 Free Software Foundation, Inc. Step #3 - "compile-libfuzzer-coverage-x86_64": This program is free software; you may redistribute it under the terms of Step #3 - "compile-libfuzzer-coverage-x86_64": the GNU General Public License version 3 or (at your option) any later version. Step #3 - "compile-libfuzzer-coverage-x86_64": This program has absolutely no warranty. Step #3 - "compile-libfuzzer-coverage-x86_64": END STRIP Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN LTO Step #3 - "compile-libfuzzer-coverage-x86_64": LTO= Step #3 - "compile-libfuzzer-coverage-x86_64": END LTO Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN NO_HARDEN Step #3 - "compile-libfuzzer-coverage-x86_64": NO_HARDEN= Step #3 - "compile-libfuzzer-coverage-x86_64": END NO_HARDEN Step #3 - "compile-libfuzzer-coverage-x86_64": END ALL Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN ALL Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN ID SALT Step #3 - "compile-libfuzzer-coverage-x86_64": salt GUIX_ENVIRONMENT= Step #3 - "compile-libfuzzer-coverage-x86_64": END ID SALT Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN FLAGS Step #3 - "compile-libfuzzer-coverage-x86_64": CPPFLAGS=-D_LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_DEBUG -DBOOST_MULTI_INDEX_ENABLE_SAFE_MODE Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": LDFLAGS= Step #3 - "compile-libfuzzer-coverage-x86_64": END FLAGS Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN CC Step #3 - "compile-libfuzzer-coverage-x86_64": clang version 18.1.8 (https://github.com/llvm/llvm-project.git 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": InstalledDir: /usr/local/bin Step #3 - "compile-libfuzzer-coverage-x86_64": Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: 32;@m32 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: x32;@mx32 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": clang version 18.1.8 (https://github.com/llvm/llvm-project.git 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": InstalledDir: /usr/local/bin Step #3 - "compile-libfuzzer-coverage-x86_64": Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: 32;@m32 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: x32;@mx32 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": (in-process) Step #3 - "compile-libfuzzer-coverage-x86_64": "/usr/local/bin/clang-18" -cc1 -triple x86_64-unknown-linux-gnu -E -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name - -mrelocation-model pic -pic-level 2 -pic-is-pie -mframe-pointer=all -fmath-errno -ffp-contract=on -fno-rounding-math -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -tune-cpu generic -debugger-tuning=gdb -fdebug-compilation-dir=/src/bitcoin-core/depends -v -fcoverage-compilation-dir=/src/bitcoin-core/depends -resource-dir /usr/local/lib/clang/18 -internal-isystem /usr/local/lib/clang/18/include -internal-isystem /usr/local/include -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include -internal-externc-isystem /usr/include/x86_64-linux-gnu -internal-externc-isystem /include -internal-externc-isystem /usr/include -ferror-limit 19 -fgnuc-version=4.2.1 -fskip-odr-check-in-gmf -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /dev/null -x c - Step #3 - "compile-libfuzzer-coverage-x86_64": clang -cc1 version 18.1.8 based upon LLVM 18.1.8 default target x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/include" Step #3 - "compile-libfuzzer-coverage-x86_64": #include "..." search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": #include <...> search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include Step #3 - "compile-libfuzzer-coverage-x86_64": End of search list. Step #3 - "compile-libfuzzer-coverage-x86_64": clang version 18.1.8 (https://github.com/llvm/llvm-project.git 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": InstalledDir: /usr/local/bin Step #3 - "compile-libfuzzer-coverage-x86_64": Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: 32;@m32 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: x32;@mx32 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": (in-process) Step #3 - "compile-libfuzzer-coverage-x86_64": "/usr/local/bin/clang-18" -cc1 -triple x86_64-unknown-linux-gnu -E -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name - -mrelocation-model pic -pic-level 2 -pic-is-pie -mframe-pointer=all -fmath-errno -ffp-contract=on -fno-rounding-math -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -tune-cpu generic -debugger-tuning=gdb -fdebug-compilation-dir=/src/bitcoin-core/depends -v -fcoverage-compilation-dir=/src/bitcoin-core/depends -resource-dir /usr/local/lib/clang/18 -internal-isystem /usr/local/lib/clang/18/include -internal-isystem /usr/local/include -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include -internal-externc-isystem /usr/include/x86_64-linux-gnu -internal-externc-isystem /include -internal-externc-isystem /usr/include -ferror-limit 19 -fgnuc-version=4.2.1 -fskip-odr-check-in-gmf -fobjc-runtime=gcc -fobjc-encode-cxx-class-template-spec -fobjc-exceptions -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /dev/null -x objective-c - Step #3 - "compile-libfuzzer-coverage-x86_64": clang -cc1 version 18.1.8 based upon LLVM 18.1.8 default target x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/include" Step #3 - "compile-libfuzzer-coverage-x86_64": #include "..." search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": #include <...> search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include Step #3 - "compile-libfuzzer-coverage-x86_64": End of search list. Step #3 - "compile-libfuzzer-coverage-x86_64": C_STANDARD=c11 Step #3 - "compile-libfuzzer-coverage-x86_64": END CC Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN CXX Step #3 - "compile-libfuzzer-coverage-x86_64": clang version 18.1.8 (https://github.com/llvm/llvm-project.git 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": InstalledDir: /usr/local/bin Step #3 - "compile-libfuzzer-coverage-x86_64": Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: 32;@m32 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: x32;@mx32 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": clang version 18.1.8 (https://github.com/llvm/llvm-project.git 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": InstalledDir: /usr/local/bin Step #3 - "compile-libfuzzer-coverage-x86_64": Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: 32;@m32 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: x32;@mx32 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": (in-process) Step #3 - "compile-libfuzzer-coverage-x86_64": "/usr/local/bin/clang-18" -cc1 -triple x86_64-unknown-linux-gnu -E -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name - -mrelocation-model pic -pic-level 2 -pic-is-pie -mframe-pointer=all -fmath-errno -ffp-contract=on -fno-rounding-math -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -tune-cpu generic -debugger-tuning=gdb -fdebug-compilation-dir=/src/bitcoin-core/depends -v -fcoverage-compilation-dir=/src/bitcoin-core/depends -resource-dir /usr/local/lib/clang/18 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/x86_64-linux-gnu/c++/9 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/backward -internal-isystem /usr/local/lib/clang/18/include -internal-isystem /usr/local/include -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include -internal-externc-isystem /usr/include/x86_64-linux-gnu -internal-externc-isystem /include -internal-externc-isystem /usr/include -fdeprecated-macro -ferror-limit 19 -fgnuc-version=4.2.1 -fskip-odr-check-in-gmf -fcxx-exceptions -fexceptions -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /dev/null -x c++ - Step #3 - "compile-libfuzzer-coverage-x86_64": clang -cc1 version 18.1.8 based upon LLVM 18.1.8 default target x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/include" Step #3 - "compile-libfuzzer-coverage-x86_64": #include "..." search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": #include <...> search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/x86_64-linux-gnu/c++/9 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/backward Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include Step #3 - "compile-libfuzzer-coverage-x86_64": End of search list. Step #3 - "compile-libfuzzer-coverage-x86_64": clang version 18.1.8 (https://github.com/llvm/llvm-project.git 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) Step #3 - "compile-libfuzzer-coverage-x86_64": Target: x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": Thread model: posix Step #3 - "compile-libfuzzer-coverage-x86_64": InstalledDir: /usr/local/bin Step #3 - "compile-libfuzzer-coverage-x86_64": Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected GCC installation: /usr/lib/gcc/x86_64-linux-gnu/9 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: 32;@m32 Step #3 - "compile-libfuzzer-coverage-x86_64": Candidate multilib: x32;@mx32 Step #3 - "compile-libfuzzer-coverage-x86_64": Selected multilib: .;@m64 Step #3 - "compile-libfuzzer-coverage-x86_64": (in-process) Step #3 - "compile-libfuzzer-coverage-x86_64": "/usr/local/bin/clang-18" -cc1 -triple x86_64-unknown-linux-gnu -E -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name - -mrelocation-model pic -pic-level 2 -pic-is-pie -mframe-pointer=all -fmath-errno -ffp-contract=on -fno-rounding-math -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -tune-cpu generic -debugger-tuning=gdb -fdebug-compilation-dir=/src/bitcoin-core/depends -v -fcoverage-compilation-dir=/src/bitcoin-core/depends -resource-dir /usr/local/lib/clang/18 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/x86_64-linux-gnu/c++/9 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/backward -internal-isystem /usr/local/lib/clang/18/include -internal-isystem /usr/local/include -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include -internal-externc-isystem /usr/include/x86_64-linux-gnu -internal-externc-isystem /include -internal-externc-isystem /usr/include -fdeprecated-macro -ferror-limit 19 -fgnuc-version=4.2.1 -fskip-odr-check-in-gmf -fobjc-runtime=gcc -fobjc-encode-cxx-class-template-spec -fobjc-exceptions -fcxx-exceptions -fexceptions -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /dev/null -x objective-c++ - Step #3 - "compile-libfuzzer-coverage-x86_64": clang -cc1 version 18.1.8 based upon LLVM 18.1.8 default target x86_64-unknown-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/usr/lib/gcc/x86_64-linux-gnu/9/../../../../x86_64-linux-gnu/include" Step #3 - "compile-libfuzzer-coverage-x86_64": ignoring nonexistent directory "/include" Step #3 - "compile-libfuzzer-coverage-x86_64": #include "..." search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": #include <...> search starts here: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/x86_64-linux-gnu/c++/9 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/backward Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include/x86_64-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/include Step #3 - "compile-libfuzzer-coverage-x86_64": End of search list. Step #3 - "compile-libfuzzer-coverage-x86_64": CXX_STANDARD=c++20 Step #3 - "compile-libfuzzer-coverage-x86_64": END CXX Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN lld Step #3 - "compile-libfuzzer-coverage-x86_64": LLD 18.1.8 (compatible with GNU linkers) Step #3 - "compile-libfuzzer-coverage-x86_64": END lld Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN mold Step #3 - "compile-libfuzzer-coverage-x86_64": bash: mold: command not found Step #3 - "compile-libfuzzer-coverage-x86_64": END mold Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN AR Step #3 - "compile-libfuzzer-coverage-x86_64": LLVM (http://llvm.org/): Step #3 - "compile-libfuzzer-coverage-x86_64": LLVM version 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": Optimized build. Step #3 - "compile-libfuzzer-coverage-x86_64": END AR Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN NM Step #3 - "compile-libfuzzer-coverage-x86_64": llvm-nm, compatible with GNU nm Step #3 - "compile-libfuzzer-coverage-x86_64": LLVM (http://llvm.org/): Step #3 - "compile-libfuzzer-coverage-x86_64": LLVM version 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": Optimized build. Step #3 - "compile-libfuzzer-coverage-x86_64": END NM Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN RANLIB Step #3 - "compile-libfuzzer-coverage-x86_64": LLVM (http://llvm.org/): Step #3 - "compile-libfuzzer-coverage-x86_64": LLVM version 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": Optimized build. Step #3 - "compile-libfuzzer-coverage-x86_64": END RANLIB Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN STRIP Step #3 - "compile-libfuzzer-coverage-x86_64": bash: llvm-strip: command not found Step #3 - "compile-libfuzzer-coverage-x86_64": END STRIP Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN LTO Step #3 - "compile-libfuzzer-coverage-x86_64": LTO= Step #3 - "compile-libfuzzer-coverage-x86_64": END LTO Step #3 - "compile-libfuzzer-coverage-x86_64": BEGIN NO_HARDEN Step #3 - "compile-libfuzzer-coverage-x86_64": NO_HARDEN= Step #3 - "compile-libfuzzer-coverage-x86_64": END NO_HARDEN Step #3 - "compile-libfuzzer-coverage-x86_64": END ALL Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching boost_1_81_0.tar.gz from https://archives.boost.io/release/1.81.0/source/ Step #3 - "compile-libfuzzer-coverage-x86_64": % Total % Received % Xferd Average Speed Time Time Time Current Step #3 - "compile-libfuzzer-coverage-x86_64": Dload Upload Total Spent Left Speed Step #3 - "compile-libfuzzer-coverage-x86_64": 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 10 133M 10 14.0M 0 0 50.9M 0 0:00:02 --:--:-- 0:00:02 50.7M 41 133M 41 56.0M 0 0 44.5M 0 0:00:03 0:00:01 0:00:02 44.4M 100 133M 100 133M 0 0 85.1M 0 0:00:01 0:00:01 --:--:-- 85.1M Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/download/boost-1.81.0/boost_1_81_0.tar.gz.temp: OK Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting boost... Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/sources/boost_1_81_0.tar.gz: OK Step #3 - "compile-libfuzzer-coverage-x86_64": Preprocessing boost... Step #3 - "compile-libfuzzer-coverage-x86_64": Configuring boost... Step #3 - "compile-libfuzzer-coverage-x86_64": Building boost... Step #3 - "compile-libfuzzer-coverage-x86_64": Staging boost... Step #3 - "compile-libfuzzer-coverage-x86_64": Postprocessing boost... Step #3 - "compile-libfuzzer-coverage-x86_64": Caching boost... Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching libevent-2.1.12-stable.tar.gz from https://github.com/libevent/libevent/releases/download/release-2.1.12-stable/ Step #3 - "compile-libfuzzer-coverage-x86_64": % Total % Received % Xferd Average Speed Time Time Time Current Step #3 - "compile-libfuzzer-coverage-x86_64": Dload Upload Total Spent Left Speed Step #3 - "compile-libfuzzer-coverage-x86_64": 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Step #3 - "compile-libfuzzer-coverage-x86_64": 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 1075k 100 1075k 0 0 3247k 0 --:--:-- --:--:-- --:--:-- 6178k Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/download/libevent-2.1.12-stable/libevent-2.1.12-stable.tar.gz.temp: OK Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting libevent... Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/sources/libevent-2.1.12-stable.tar.gz: OK Step #3 - "compile-libfuzzer-coverage-x86_64": Preprocessing libevent... Step #3 - "compile-libfuzzer-coverage-x86_64": patching file CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": Configuring libevent... Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Git: /usr/bin/git (found version "2.25.1") Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wall Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wall - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wextra Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wextra - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wno_unused_parameter Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wno_unused_parameter - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wstrict_aliasing Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wstrict_aliasing - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wstrict_prototypes Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wstrict_prototypes - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__fno_strict_aliasing Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__fno_strict_aliasing - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wmissing_prototypes Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wmissing_prototypes - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Winit_self Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Winit_self - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wmissing_field_initializers Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wmissing_field_initializers - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wdeclaration_after_statement Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wdeclaration_after_statement - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Waddress Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Waddress - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wnormalized_id Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wnormalized_id - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Woverride_init Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Woverride_init - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wlogical_op Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wlogical_op - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wwrite_strings Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wwrite_strings - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wno_unused_function Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test check_c_compiler_flag__Wno_unused_function - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __GNU_LIBRARY__ Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __GNU_LIBRARY__ - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include file fcntl.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include file fcntl.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include files fcntl.h, inttypes.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for include files fcntl.h, inttypes.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 3 include files fcntl.h, ..., memory.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 3 include files fcntl.h, ..., memory.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 4 include files fcntl.h, ..., signal.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 4 include files fcntl.h, ..., signal.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 5 include files fcntl.h, ..., stdarg.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 5 include files fcntl.h, ..., stdarg.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 6 include files fcntl.h, ..., stddef.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 6 include files fcntl.h, ..., stddef.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 7 include files fcntl.h, ..., stdint.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 7 include files fcntl.h, ..., stdint.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 8 include files fcntl.h, ..., stdlib.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 8 include files fcntl.h, ..., stdlib.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 9 include files fcntl.h, ..., string.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 9 include files fcntl.h, ..., string.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 10 include files fcntl.h, ..., errno.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 10 include files fcntl.h, ..., errno.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 11 include files fcntl.h, ..., unistd.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 11 include files fcntl.h, ..., unistd.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 12 include files fcntl.h, ..., time.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 12 include files fcntl.h, ..., time.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 13 include files fcntl.h, ..., sys/types.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 13 include files fcntl.h, ..., sys/types.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 14 include files fcntl.h, ..., sys/stat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 14 include files fcntl.h, ..., sys/stat.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 15 include files fcntl.h, ..., sys/time.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 15 include files fcntl.h, ..., sys/time.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 16 include files fcntl.h, ..., sys/param.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 16 include files fcntl.h, ..., sys/param.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 17 include files fcntl.h, ..., netdb.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 17 include files fcntl.h, ..., netdb.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 18 include files fcntl.h, ..., dlfcn.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 18 include files fcntl.h, ..., dlfcn.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 19 include files fcntl.h, ..., arpa/inet.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 19 include files fcntl.h, ..., arpa/inet.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 20 include files fcntl.h, ..., poll.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 20 include files fcntl.h, ..., poll.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 21 include files fcntl.h, ..., port.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 21 include files fcntl.h, ..., port.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 21 include files fcntl.h, ..., sys/socket.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 21 include files fcntl.h, ..., sys/socket.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 22 include files fcntl.h, ..., sys/random.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 22 include files fcntl.h, ..., sys/random.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 23 include files fcntl.h, ..., sys/un.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 23 include files fcntl.h, ..., sys/un.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 24 include files fcntl.h, ..., sys/devpoll.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 24 include files fcntl.h, ..., sys/devpoll.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 24 include files fcntl.h, ..., sys/epoll.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 24 include files fcntl.h, ..., sys/epoll.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 25 include files fcntl.h, ..., sys/eventfd.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 25 include files fcntl.h, ..., sys/eventfd.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 26 include files fcntl.h, ..., sys/event.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 26 include files fcntl.h, ..., sys/event.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 26 include files fcntl.h, ..., sys/ioctl.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 26 include files fcntl.h, ..., sys/ioctl.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 27 include files fcntl.h, ..., sys/mman.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 27 include files fcntl.h, ..., sys/mman.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 28 include files fcntl.h, ..., sys/queue.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 28 include files fcntl.h, ..., sys/queue.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 29 include files fcntl.h, ..., sys/select.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 29 include files fcntl.h, ..., sys/select.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 30 include files fcntl.h, ..., sys/sendfile.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 30 include files fcntl.h, ..., sys/sendfile.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 31 include files fcntl.h, ..., sys/uio.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 31 include files fcntl.h, ..., sys/uio.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 32 include files fcntl.h, ..., sys/wait.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 32 include files fcntl.h, ..., sys/wait.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 33 include files fcntl.h, ..., sys/resource.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 33 include files fcntl.h, ..., sys/resource.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 34 include files fcntl.h, ..., sys/timerfd.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 34 include files fcntl.h, ..., sys/timerfd.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 35 include files fcntl.h, ..., netinet/in.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 35 include files fcntl.h, ..., netinet/in.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 36 include files fcntl.h, ..., netinet/in6.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 36 include files fcntl.h, ..., netinet/in6.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 36 include files fcntl.h, ..., netinet/tcp.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 36 include files fcntl.h, ..., netinet/tcp.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 37 include files fcntl.h, ..., ifaddrs.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for 37 include files fcntl.h, ..., ifaddrs.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getaddrinfo Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getaddrinfo - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getnameinfo Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getnameinfo - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getprotobynumber Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getprotobynumber - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getservbyname Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getservbyname - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gethostbyname Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gethostbyname - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for inet_ntop Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for inet_ntop - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for inet_pton Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for inet_pton - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gettimeofday Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gettimeofday - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for signal Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for signal - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtoll Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtoll - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for splice Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for splice - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strlcpy Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strlcpy - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strsep Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strsep - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtok_r Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtok_r - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for vasprintf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for vasprintf - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timerclear Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timerclear - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timercmp Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timercmp - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timerisset Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timerisset - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timeradd Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timeradd - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for nanosleep Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for nanosleep - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for putenv Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for putenv - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for umask Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for umask - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for clock_gettime Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for clock_gettime - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getifaddrs Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getifaddrs - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for select Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for select - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for epoll_create Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for epoll_create - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for epoll_create1 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for epoll_create1 - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for epoll_ctl Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for epoll_ctl - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for eventfd Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for eventfd - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for poll Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for poll - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for port_create Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for port_create - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for kqueue Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for kqueue - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fcntl Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fcntl - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mmap Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mmap - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pipe Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pipe - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pipe2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pipe2 - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sendfile Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sendfile - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sigaction Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sigaction - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strsignal Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strsignal - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sysctl Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sysctl - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for accept4 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for accept4 - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for arc4random Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for arc4random - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for arc4random_buf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for arc4random_buf - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for arc4random_addrandom Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for arc4random_addrandom - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getrandom Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getrandom - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getegid Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getegid - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for geteuid Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for geteuid - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for issetugid Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for issetugid - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for usleep Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for usleep - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timerfd_create Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for timerfd_create - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setenv Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setenv - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for unsetenv Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for unsetenv - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setrlimit Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setrlimit - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gethostbyname_r Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gethostbyname_r - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Checking prototype gethostbyname_r for EVENT__HAVE_GETHOSTBYNAME_R_3_ARG - False Step #3 - "compile-libfuzzer-coverage-x86_64": -- Checking prototype gethostbyname_r for EVENT__HAVE_GETHOSTBYNAME_R_5_ARG - False Step #3 - "compile-libfuzzer-coverage-x86_64": -- Checking prototype gethostbyname_r for EVENT__HAVE_GETHOSTBYNAME_R_6_ARG - True Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/types.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/types.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdint.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdint.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stddef.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stddef.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct sockaddr_un Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct sockaddr_un - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint8_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint8_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint16_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint16_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint32_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint32_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint64_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint64_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of short Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of short - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of int Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of int - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned int Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned int - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long long Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long long - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_INLINE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_INLINE - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __func__ Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __func__ - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __FUNCTION__ Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __FUNCTION__ - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for TAILQ_FOREACH Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for TAILQ_FOREACH - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_DECL_CTL_KERN Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_DECL_CTL_KERN - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for CTL_KERN - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_DECL_KERN_ARND Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_DECL_KERN_ARND - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for KERN_ARND - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for F_SETFD Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for F_SETFD - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of fd_mask Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of fd_mask - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of size_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of size_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of off_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of off_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ssize_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ssize_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of SSIZE_T Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of SSIZE_T - failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of socklen_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of socklen_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of pid_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of pid_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of pthread_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of pthread_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uintptr_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uintptr_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of void * Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of void * - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of time_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of time_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct addrinfo Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct addrinfo - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct in6_addr Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct in6_addr - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_IN6_ADDR_S6_ADDR16 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_IN6_ADDR_S6_ADDR16 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_IN6_ADDR_S6_ADDR32 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_IN6_ADDR_S6_ADDR32 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of sa_family_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of sa_family_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct sockaddr_in6 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct sockaddr_in6 - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_IN6_SIN6_LEN Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_IN6_SIN6_LEN - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_IN_SIN_LEN Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_IN_SIN_LEN - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct sockaddr_storage Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct sockaddr_storage - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_STORAGE_SS_FAMILY Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_STORAGE_SS_FAMILY - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_STORAGE___SS_FAMILY Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test EVENT__HAVE_STRUCT_SOCKADDR_STORAGE___SS_FAMILY - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct linger Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of struct linger - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Threads: TRUE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Step #3 - "compile-libfuzzer-coverage-x86_64": -- ---( Libevent 2.1.12-stable )--- Step #3 - "compile-libfuzzer-coverage-x86_64": -- Step #3 - "compile-libfuzzer-coverage-x86_64": -- Available event backends: Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_BINARY_DIR: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/build Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_CURRENT_BINARY_DIR: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/build Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_SOURCE_DIR: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37 Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_CURRENT_SOURCE_DIR: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37 Step #3 - "compile-libfuzzer-coverage-x86_64": -- PROJECT_BINARY_DIR: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/build Step #3 - "compile-libfuzzer-coverage-x86_64": -- PROJECT_SOURCE_DIR: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37 Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_MODULE_PATH: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/cmake/ Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_COMMAND: /usr/local/bin/cmake Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_ROOT: /usr/local/share/cmake-3.29 Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_SYSTEM: Linux-5.10.0-32-cloud-amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_SYSTEM_NAME: Linux Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_SYSTEM_VERSION: 5.10.0-32-cloud-amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_SYSTEM_PROCESSOR: x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_SKIP_RPATH: NO Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_VERBOSE_MAKEFILE: Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_C_FLAGS: -D_LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_DEBUG -DBOOST_MULTI_INDEX_ENABLE_SAFE_MODE -I/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include -D_GNU_SOURCE -D_FORTIFY_SOURCE=3 -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -ffile-prefix-map=/src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37=/usr -Wall -Wextra -Wno-unused-parameter -Wstrict-aliasing -Wstrict-prototypes -fno-strict-aliasing -Wmissing-prototypes -Winit-self -Wmissing-field-initializers -Wdeclaration-after-statement -Waddress -Woverride-init -Wwrite-strings -Wno-unused-function Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_BUILD_TYPE: None Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_C_COMPILER: /usr/local/bin/clang (id Clang, clang 1, GNUC 1) Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_AR: /usr/local/bin/llvm-ar Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_RANLIB: /usr/local/bin/llvm-ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": -- Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (15.8s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.0s) Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning: Step #3 - "compile-libfuzzer-coverage-x86_64": Manually-specified variables were not used by the project: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": CMAKE_INSTALL_LIBDIR Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/build Step #3 - "compile-libfuzzer-coverage-x86_64": Building libevent... Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Building C object CMakeFiles/event_core_static.dir/buffer.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building C object CMakeFiles/event_core_static.dir/bufferevent.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building C object CMakeFiles/event_core_static.dir/bufferevent_pair.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building C object CMakeFiles/event_core_static.dir/bufferevent_filter.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building C object CMakeFiles/event_core_static.dir/bufferevent_ratelim.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building C object CMakeFiles/event_core_static.dir/bufferevent_sock.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Building C object CMakeFiles/event_core_static.dir/event.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building C object CMakeFiles/event_core_static.dir/evmap.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building C object CMakeFiles/event_core_static.dir/evthread.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building C object CMakeFiles/event_core_static.dir/evutil.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building C object CMakeFiles/event_core_static.dir/evutil_rand.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object CMakeFiles/event_core_static.dir/evutil_time.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object CMakeFiles/event_core_static.dir/listener.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 27%] Building C object CMakeFiles/event_core_static.dir/signal.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building C object CMakeFiles/event_core_static.dir/log.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building C object CMakeFiles/event_core_static.dir/strlcpy.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building C object CMakeFiles/event_core_static.dir/select.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object CMakeFiles/event_core_static.dir/poll.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object CMakeFiles/event_core_static.dir/epoll.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/strlcpy.c:48:1: warning: a function definition without a prototype is deprecated in all versions of C and is not supported in C23 [-Wdeprecated-non-prototype] Step #3 - "compile-libfuzzer-coverage-x86_64": 48 | event_strlcpy_(dst, src, siz) Step #3 - "compile-libfuzzer-coverage-x86_64": | ^ Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/evutil.c:213:21: warning: argument 'fd' of type 'int[2]' with mismatched bound [-Warray-parameter] Step #3 - "compile-libfuzzer-coverage-x86_64": 213 | evutil_socket_t fd[2]) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/util-internal.h:306:62: note: previously declared as 'int[]' here Step #3 - "compile-libfuzzer-coverage-x86_64": 306 | int evutil_ersatz_socketpair_(int, int , int, evutil_socket_t[]); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/evthread.c:77:60: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] Step #3 - "compile-libfuzzer-coverage-x86_64": 77 | struct evthread_lock_callbacks *evthread_get_lock_callbacks() Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  void Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/evthread.c:82:70: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] Step #3 - "compile-libfuzzer-coverage-x86_64": 82 | struct evthread_condition_callbacks *evthread_get_condition_callbacks() Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  void Step #3 - "compile-libfuzzer-coverage-x86_64": 2 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Linking C static library lib/libevent_core.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Built target event_core_static Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building C object CMakeFiles/event_pthreads_static.dir/evthread_pthread.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building C object CMakeFiles/event_extra_static.dir/event_tagging.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building C object CMakeFiles/event_extra_static.dir/http.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building C object CMakeFiles/event_extra_static.dir/evdns.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building C object CMakeFiles/event_extra_static.dir/evrpc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building C object CMakeFiles/event_static.dir/buffer.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building C object CMakeFiles/event_static.dir/bufferevent.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building C object CMakeFiles/event_static.dir/bufferevent_filter.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building C object CMakeFiles/event_static.dir/bufferevent_pair.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 58%] Building C object CMakeFiles/event_static.dir/bufferevent_ratelim.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building C object CMakeFiles/event_static.dir/bufferevent_sock.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object CMakeFiles/event_static.dir/event.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building C object CMakeFiles/event_static.dir/evmap.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building C object CMakeFiles/event_static.dir/evthread.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building C object CMakeFiles/event_static.dir/evutil.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building C object CMakeFiles/event_static.dir/evutil_rand.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Building C object CMakeFiles/event_static.dir/evutil_time.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building C object CMakeFiles/event_static.dir/listener.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building C object CMakeFiles/event_static.dir/log.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Building C object CMakeFiles/event_static.dir/signal.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Building C object CMakeFiles/event_static.dir/strlcpy.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building C object CMakeFiles/event_static.dir/select.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building C object CMakeFiles/event_static.dir/poll.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building C object CMakeFiles/event_static.dir/epoll.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building C object CMakeFiles/event_static.dir/event_tagging.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Building C object CMakeFiles/event_static.dir/http.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building C object CMakeFiles/event_static.dir/evdns.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Building C object CMakeFiles/event_static.dir/evrpc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/strlcpy.c:48:1: warning: a function definition without a prototype is deprecated in all versions of C and is not supported in C23 [-Wdeprecated-non-prototype] Step #3 - "compile-libfuzzer-coverage-x86_64": 48 | event_strlcpy_(dst, src, siz) Step #3 - "compile-libfuzzer-coverage-x86_64": | ^ Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/evthread.c:77:60: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] Step #3 - "compile-libfuzzer-coverage-x86_64": 77 | struct evthread_lock_callbacks *evthread_get_lock_callbacks() Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  void Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/evthread.c:82:70: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] Step #3 - "compile-libfuzzer-coverage-x86_64": 82 | struct evthread_condition_callbacks *evthread_get_condition_callbacks() Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  void Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Linking C static library lib/libevent_pthreads.a Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/evutil.c:213:21: warning: argument 'fd' of type 'int[2]' with mismatched bound [-Warray-parameter] Step #3 - "compile-libfuzzer-coverage-x86_64": 213 | evutil_socket_t fd[2]) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/build/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/util-internal.h:306:62: note: previously declared as 'int[]' here Step #3 - "compile-libfuzzer-coverage-x86_64": 306 | int evutil_ersatz_socketpair_(int, int , int, evutil_socket_t[]); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Built target event_pthreads_static Step #3 - "compile-libfuzzer-coverage-x86_64": 2 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Linking C static library lib/libevent.a Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C static library lib/libevent_extra.a Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target event_extra_static Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target event_static Step #3 - "compile-libfuzzer-coverage-x86_64": Staging libevent... Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Built target event_core_static Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Built target event_pthreads_static Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Built target event_extra_static Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target event_static Step #3 - "compile-libfuzzer-coverage-x86_64": Install the project... Step #3 - "compile-libfuzzer-coverage-x86_64": -- Install configuration: "None" Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libevent_core.a Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/pkgconfig/libevent_core.pc Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libevent_extra.a Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/pkgconfig/libevent_extra.pc Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libevent_pthreads.a Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/pkgconfig/libevent_pthreads.pc Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libevent.a Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/pkgconfig/libevent.pc Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/evdns.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/evrpc.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/evhttp.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/evutil.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/buffer.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/bufferevent.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/bufferevent_compat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/bufferevent_struct.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/buffer_compat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/dns.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/dns_compat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/dns_struct.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/event.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/event_compat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/event_struct.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/http.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/http_compat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/http_struct.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/keyvalq_struct.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/listener.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/rpc.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/rpc_compat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/rpc_struct.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/tag.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/tag_compat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/thread.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/util.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/visibility.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include/event2/event-config.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/cmake/libevent/LibeventConfig.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/cmake/libevent/LibeventConfigVersion.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/cmake/libevent/LibeventTargets-static.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/cmake/libevent/LibeventTargets-static-none.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": -- Installing: /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/libevent/2.1.12-stable-e1f2b182c37/src/bitcoin-core/depends/x86_64-pc-linux-gnu/bin/event_rpcgen.py Step #3 - "compile-libfuzzer-coverage-x86_64": Postprocessing libevent... Step #3 - "compile-libfuzzer-coverage-x86_64": Caching libevent... Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching sqlite-autoconf-3460100.tar.gz from https://sqlite.org/2024/ Step #3 - "compile-libfuzzer-coverage-x86_64": % Total % Received % Xferd Average Speed Time Time Time Current Step #3 - "compile-libfuzzer-coverage-x86_64": Dload Upload Total Spent Left Speed Step #3 - "compile-libfuzzer-coverage-x86_64": 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 3189k 100 3189k 0 0 8156k 0 --:--:-- --:--:-- --:--:-- 8156k Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/work/download/sqlite-3460100/sqlite-autoconf-3460100.tar.gz.temp: OK Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting sqlite... Step #3 - "compile-libfuzzer-coverage-x86_64": /src/bitcoin-core/depends/sources/sqlite-autoconf-3460100.tar.gz: OK Step #3 - "compile-libfuzzer-coverage-x86_64": Preprocessing sqlite... Step #3 - "compile-libfuzzer-coverage-x86_64": Configuring sqlite... Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a race-free mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the compiler supports GNU C... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to enable C11 features... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for special C compiler options needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for _FILE_OFFSET_BITS value needed for large files... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-gcc... (cached) clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the compiler supports GNU C... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to enable C11 features... (cached) none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... (cached) gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... llvm-nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (llvm-nm) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-objdump... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-ar... llvm-ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-strip... llvm-strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-ranlib... llvm-ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse llvm-nm output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for x86_64-pc-linux-gnu-mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdio.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fdatasync... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for usleep... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fullfsync... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for localtime_r... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gmtime_r... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang options needed to detect all undeclared functions... -fno-builtin Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether strerror_r is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether strerror_r returns char *... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for editline/readline.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing pthread_create... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing pthread_mutexattr_init... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for whether to support dynamic extensions... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking SQL math functions... enabled Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing ceil... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking FTS4 extension... disabled Step #3 - "compile-libfuzzer-coverage-x86_64": checking FTS3 extension... disabled Step #3 - "compile-libfuzzer-coverage-x86_64": checking FTS5 extension... disabled Step #3 - "compile-libfuzzer-coverage-x86_64": checking RTREE extension... disabled Step #3 - "compile-libfuzzer-coverage-x86_64": checking Session extension... disabled Step #3 - "compile-libfuzzer-coverage-x86_64": checking Build type... release Step #3 - "compile-libfuzzer-coverage-x86_64": checking for posix_fallocate... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for zlib.h... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing system... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating sqlite3.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": Building sqlite... Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DPACKAGE_NAME=\"sqlite\" -DPACKAGE_TARNAME=\"sqlite\" -DPACKAGE_VERSION=\"3.46.1\" "-DPACKAGE_STRING=\"sqlite 3.46.1\"" -DPACKAGE_BUGREPORT=\"http://www.sqlite.org\" -DPACKAGE_URL=\"\" -DPACKAGE=\"sqlite\" -DVERSION=\"3.46.1\" -DHAVE_STDIO_H=1 -DHAVE_STDLIB_H=1 -DHAVE_STRING_H=1 -DHAVE_INTTYPES_H=1 -DHAVE_STDINT_H=1 -DHAVE_STRINGS_H=1 -DHAVE_SYS_STAT_H=1 -DHAVE_SYS_TYPES_H=1 -DHAVE_UNISTD_H=1 -DSTDC_HEADERS=1 -DHAVE_DLFCN_H=1 -DLT_OBJDIR=\".libs/\" -DHAVE_FDATASYNC=1 -DHAVE_USLEEP=1 -DHAVE_LOCALTIME_R=1 -DHAVE_GMTIME_R=1 -DHAVE_DECL_STRERROR_R=1 -DHAVE_STRERROR_R=1 -DHAVE_POSIX_FALLOCATE=1 -I. -D_LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_DEBUG -DBOOST_MULTI_INDEX_ENABLE_SAFE_MODE -I/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include -DSQLITE_DQS=0 -DSQLITE_DEFAULT_MEMSTATUS=0 -DSQLITE_OMIT_DEPRECATED -DSQLITE_OMIT_SHARED_CACHE -DSQLITE_OMIT_JSON -DSQLITE_LIKE_DOESNT_MATCH_BLOBS -DSQLITE_OMIT_DECLTYPE -DSQLITE_OMIT_PROGRESS_CALLBACK -DSQLITE_OMIT_AUTOINIT -DSQLITE_DEBUG -D_REENTRANT=1 -DSQLITE_THREADSAFE=1 -DSQLITE_OMIT_LOAD_EXTENSION=1 -DSQLITE_ENABLE_MATH_FUNCTIONS -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT sqlite3.lo -MD -MP -MF .deps/sqlite3.Tpo -c sqlite3.c -fPIC -DPIC -o sqlite3.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: llvm-ar cr .libs/libsqlite3.a sqlite3.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: llvm-ranlib .libs/libsqlite3.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "libsqlite3.la" && ln -s "../libsqlite3.la" "libsqlite3.la" ) Step #3 - "compile-libfuzzer-coverage-x86_64": Staging sqlite... Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ./libtool --mode=install /usr/bin/install -c libsqlite3.la '/src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 sqlite3.pc '/src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 sqlite3.h sqlite3ext.h '/src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/include' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libsqlite3.lai /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libsqlite3.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libsqlite3.a /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libsqlite3.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libsqlite3.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: llvm-ranlib /src/bitcoin-core/depends/work/staging/x86_64-pc-linux-gnu/sqlite/3460100-af7c26a77d0/src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/libsqlite3.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: warning(B: remember to run 'libtool --finish /src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib'(B Step #3 - "compile-libfuzzer-coverage-x86_64": Postprocessing sqlite... Step #3 - "compile-libfuzzer-coverage-x86_64": Caching sqlite... Step #3 - "compile-libfuzzer-coverage-x86_64": copying packages: boost libevent sqlite Step #3 - "compile-libfuzzer-coverage-x86_64": to: /src/bitcoin-core/depends/x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": To build Bitcoin Core with these packages, pass '--toolchain /src/bitcoin-core/depends/x86_64-pc-linux-gnu/toolchain.cmake' to the first CMake invocation. Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's|PROVIDE_FUZZ_MAIN_FUNCTION|NEVER_PROVIDE_MAIN_FOR_OSS_FUZZ|g' ./src/test/fuzz/util/CMakeLists.txt Step #3 - "compile-libfuzzer-coverage-x86_64": + EXTRA_BUILD_OPTIONS= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = memory ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake -B build_fuzz --toolchain depends/x86_64-pc-linux-gnu/toolchain.cmake -DCMAKE_C_FLAGS_RELWITHDEBINFO= -DCMAKE_CXX_FLAGS_RELWITHDEBINFO= -DBUILD_FOR_FUZZING=ON -DSANITIZER_LDFLAGS=-fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found SQLite3: /src/bitcoin-core/depends/x86_64-pc-linux-gnu/include (found suitable version "3.46.1", minimum required is "3.7.17") Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning at CMakeLists.txt:212 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": BUILD_FOR_FUZZING=ON will disable all other targets and force Step #3 - "compile-libfuzzer-coverage-x86_64": BUILD_FUZZ_BINARY=ON. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WERROR Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WERROR - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Setting build type to "RelWithDebInfo" as none was specified Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__G3 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__G3 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__G3 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__G3 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FTRAPV Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FTRAPV - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FTRAPV Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FTRAPV - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___FATAL_WARNINGS Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___FATAL_WARNINGS - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Threads: TRUE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FUZZ_BINARY_LINKS_WITHOUT_MAIN_FUNCTION Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FUZZ_BINARY_LINKS_WITHOUT_MAIN_FUNCTION - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Boost: /src/bitcoin-core/depends/x86_64-pc-linux-gnu/include (found suitable version "1.81.0", minimum required is "1.73.0") Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test NO_DIAGNOSTICS_BOOST_NO_CXX98_FUNCTION_BASE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test NO_DIAGNOSTICS_BOOST_NO_CXX98_FUNCTION_BASE - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Libevent: /src/bitcoin-core/depends/x86_64-pc-linux-gnu/lib/cmake/libevent (found suitable version "2.1.12", minimum required is "2.1.8") Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_EVHTTP_CONNECTION_GET_PEER_CONST_CHAR Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_EVHTTP_CONNECTION_GET_PEER_CONST_CHAR - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/prctl.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/prctl.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/resources.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/resources.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/vmmeter.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/vmmeter.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include vm/vm_param.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include vm/vm_param.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for O_CLOEXEC Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for O_CLOEXEC - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fdatasync Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fdatasync - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fork Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fork - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pipe2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pipe2 - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setsid Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for setsid - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/types.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/types.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include ifaddrs.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include ifaddrs.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test IFADDR_LINKS_WITHOUT_LIBSOCKET Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test IFADDR_LINKS_WITHOUT_LIBSOCKET - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test STD_ATOMIC_LINKS_WITHOUT_LIBATOMIC Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test STD_ATOMIC_LINKS_WITHOUT_LIBATOMIC - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for std::system Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for std::system - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for ::_wsystem Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for ::_wsystem - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test STRERROR_R_CHAR_P Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test STRERROR_R_CHAR_P - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for malloc_info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for malloc_info - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_MALLOPT_ARENA_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_MALLOPT_ARENA_MAX - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_POSIX_FALLOCATE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_POSIX_FALLOCATE - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_STRONG_GETAUXVAL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_STRONG_GETAUXVAL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SOCKADDR_UN Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SOCKADDR_UN - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_GETRANDOM Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_GETRANDOM - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_GETENTROPY_RAND Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_GETENTROPY_RAND - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SYSCTL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SYSCTL - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SYSCTL_ARND Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SYSCTL_ARND - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SSE41 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SSE41 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_AVX2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_AVX2 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_X86_SHANI Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_X86_SHANI - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_ARM_SHANI Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_ARM_SHANI - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WALL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WALL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WEXTRA Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WEXTRA - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WGNU Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WGNU - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WFORMAT__WFORMAT_SECURITY Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WFORMAT__WFORMAT_SECURITY - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WVLA Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WVLA - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSHADOW_FIELD Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSHADOW_FIELD - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WTHREAD_SAFETY Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WTHREAD_SAFETY - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WLOOP_ANALYSIS Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WLOOP_ANALYSIS - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WREDUNDANT_DECLS Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WREDUNDANT_DECLS - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNUSED_MEMBER_FUNCTION Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNUSED_MEMBER_FUNCTION - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDATE_TIME Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDATE_TIME - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WCONDITIONAL_UNINITIALIZED Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WCONDITIONAL_UNINITIALIZED - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDUPLICATED_BRANCHES Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDUPLICATED_BRANCHES - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDUPLICATED_COND Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDUPLICATED_COND - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WLOGICAL_OP Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WLOGICAL_OP - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WOVERLOADED_VIRTUAL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WOVERLOADED_VIRTUAL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSUGGEST_OVERRIDE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSUGGEST_OVERRIDE - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WIMPLICIT_FALLTHROUGH Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WIMPLICIT_FALLTHROUGH - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNREACHABLE_CODE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNREACHABLE_CODE - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDOCUMENTATION Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WDOCUMENTATION - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSELF_ASSIGN Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSELF_ASSIGN - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WBIDI_CHARS_ANY Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WBIDI_CHARS_ANY - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNDEF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNDEF - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNUSED_PARAMETER Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WUNUSED_PARAMETER - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FNO_EXTENDED_IDENTIFIERS Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FNO_EXTENDED_IDENTIFIERS - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FDEBUG_PREFIX_MAP_A_B Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FDEBUG_PREFIX_MAP_A_B - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FMACRO_PREFIX_MAP_A_B Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FMACRO_PREFIX_MAP_A_B - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FSTACK_REUSE_NONE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FSTACK_REUSE_NONE - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__U_FORTIFY_SOURCE__D_FORTIFY_SOURCE_3_cc10 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__U_FORTIFY_SOURCE__D_FORTIFY_SOURCE_3_cc10 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__U_FORTIFY_SOURCE__D_FORTIFY_SOURCE_3_cc10 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__U_FORTIFY_SOURCE__D_FORTIFY_SOURCE_3_cc10 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSTACK_PROTECTOR Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__WSTACK_PROTECTOR - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FSTACK_PROTECTOR_ALL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FSTACK_PROTECTOR_ALL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FSTACK_PROTECTOR_ALL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FSTACK_PROTECTOR_ALL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FCF_PROTECTION_FULL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FCF_PROTECTION_FULL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FCF_PROTECTION_FULL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FCF_PROTECTION_FULL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FSTACK_CLASH_PROTECTION Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CXX_SUPPORTS__FSTACK_CLASH_PROTECTION - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FSTACK_CLASH_PROTECTION Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__FSTACK_CLASH_PROTECTION - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___ENABLE_RELOC_SECTION Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___ENABLE_RELOC_SECTION - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___DYNAMICBASE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___DYNAMICBASE - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___NXCOMPAT Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___NXCOMPAT - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___HIGH_ENTROPY_VA Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL___HIGH_ENTROPY_VA - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL__Z_RELRO Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL__Z_RELRO - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL__Z_NOW Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL__Z_NOW - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL__Z_SEPARATE_CODE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test LINKER_SUPPORTS__WL__Z_SEPARATE_CODE - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Python3: /usr/local/bin/python3.10 (found suitable version "3.10.14", minimum required is "3.10") found components: Interpreter Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find Doxygen (missing: DOXYGEN_EXECUTABLE dot) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_BUILTIN_PREFETCH Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_BUILTIN_PREFETCH - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_MM_PREFETCH Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_MM_PREFETCH - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SSE42 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_SSE42 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_ARM64_CRC32C Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_ARM64_CRC32C - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for F_FULLFSYNC Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for F_FULLFSYNC - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_CLMUL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_CLMUL - Success Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Configuring secp256k1 subtree... Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_X86_64_ASM Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_X86_64_ASM - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find Valgrind (missing: Valgrind_INCLUDE_DIR Valgrind_WORKS) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__PEDANTIC Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__PEDANTIC - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WALL Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WALL - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WCAST_ALIGN Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WCAST_ALIGN - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WCAST_ALIGN_STRICT Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WCAST_ALIGN_STRICT - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WCONDITIONAL_UNINITIALIZED Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WCONDITIONAL_UNINITIALIZED - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WEXTRA Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WEXTRA - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNESTED_EXTERNS Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNESTED_EXTERNS - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNO_LONG_LONG Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNO_LONG_LONG - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNO_OVERLENGTH_STRINGS Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNO_OVERLENGTH_STRINGS - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNO_UNUSED_FUNCTION Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WNO_UNUSED_FUNCTION - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WRESERVED_IDENTIFIER Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WRESERVED_IDENTIFIER - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WSHADOW Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WSHADOW - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WSTRICT_PROTOTYPES Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WSTRICT_PROTOTYPES - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WUNDEF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test C_SUPPORTS__WUNDEF - Success Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": secp256k1 configure summary Step #3 - "compile-libfuzzer-coverage-x86_64": =========================== Step #3 - "compile-libfuzzer-coverage-x86_64": Build artifacts: Step #3 - "compile-libfuzzer-coverage-x86_64":  library type ........................ Static Step #3 - "compile-libfuzzer-coverage-x86_64": Optional modules: Step #3 - "compile-libfuzzer-coverage-x86_64":  ECDH ................................ OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  ECDSA pubkey recovery ............... ON Step #3 - "compile-libfuzzer-coverage-x86_64":  extrakeys ........................... ON Step #3 - "compile-libfuzzer-coverage-x86_64":  schnorrsig .......................... ON Step #3 - "compile-libfuzzer-coverage-x86_64":  musig ............................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  ElligatorSwift ...................... ON Step #3 - "compile-libfuzzer-coverage-x86_64": Parameters: Step #3 - "compile-libfuzzer-coverage-x86_64":  ecmult window size .................. 15 Step #3 - "compile-libfuzzer-coverage-x86_64":  ecmult gen table size ............... 86 KiB Step #3 - "compile-libfuzzer-coverage-x86_64": Optional features: Step #3 - "compile-libfuzzer-coverage-x86_64":  assembly ............................ x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64":  external callbacks .................. OFF Step #3 - "compile-libfuzzer-coverage-x86_64": Optional binaries: Step #3 - "compile-libfuzzer-coverage-x86_64":  benchmark ........................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  noverify_tests ...................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  tests ............................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  exhaustive tests .................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  ctime_tests ......................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  examples ............................ OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Cross compiling ....................... FALSE Step #3 - "compile-libfuzzer-coverage-x86_64": Valgrind .............................. OFF Step #3 - "compile-libfuzzer-coverage-x86_64": Preprocessor defined macros ........... ENABLE_MODULE_ELLSWIFT=1 ENABLE_MODULE_SCHNORRSIG=1 ENABLE_MODULE_EXTRAKEYS=1 ENABLE_MODULE_RECOVERY=1 ECMULT_WINDOW_SIZE=15 COMB_BLOCKS=43 COMB_TEETH=6 USE_ASM_X86_64=1 Step #3 - "compile-libfuzzer-coverage-x86_64": C compiler ............................ Clang 18.1.8, /usr/local/bin/clang Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS ................................ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": Compile options ....................... -pedantic -Wall -Wcast-align -Wconditional-uninitialized -Wextra -Wnested-externs -Wno-long-long -Wno-overlength-strings -Wno-unused-function -Wreserved-identifier -Wshadow -Wstrict-prototypes -Wundef Step #3 - "compile-libfuzzer-coverage-x86_64": Build type: Step #3 - "compile-libfuzzer-coverage-x86_64":  - CMAKE_BUILD_TYPE ................... RelWithDebInfo Step #3 - "compile-libfuzzer-coverage-x86_64":  - CFLAGS .............................  Step #3 - "compile-libfuzzer-coverage-x86_64":  - LDFLAGS for executables ............  Step #3 - "compile-libfuzzer-coverage-x86_64":  - LDFLAGS for shared libraries .......  Step #3 - "compile-libfuzzer-coverage-x86_64": SECP256K1_APPEND_LDFLAGS .............. -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Configure summary Step #3 - "compile-libfuzzer-coverage-x86_64": ================= Step #3 - "compile-libfuzzer-coverage-x86_64": Executables: Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoind ............................ OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-node (multiprocess) ......... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-qt (GUI) .................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-gui (GUI, multiprocess) ..... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-cli ......................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-tx .......................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-util ........................ OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-wallet ...................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bitcoin-chainstate (experimental) ... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  libbitcoinkernel (experimental) ..... OFF Step #3 - "compile-libfuzzer-coverage-x86_64": Optional features: Step #3 - "compile-libfuzzer-coverage-x86_64":  wallet support ...................... ON Step #3 - "compile-libfuzzer-coverage-x86_64":  - descriptor wallets (SQLite) ...... ON Step #3 - "compile-libfuzzer-coverage-x86_64":  - legacy wallets (Berkeley DB) ..... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  external signer ..................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  ZeroMQ .............................. OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  USDT tracing ........................ OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  QR code (GUI) ....................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  DBus (GUI, Linux only) .............. OFF Step #3 - "compile-libfuzzer-coverage-x86_64": Tests: Step #3 - "compile-libfuzzer-coverage-x86_64":  test_bitcoin ........................ OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  test_bitcoin-qt ..................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  bench_bitcoin ....................... OFF Step #3 - "compile-libfuzzer-coverage-x86_64":  fuzz binary ......................... ON Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Cross compiling ....................... FALSE Step #3 - "compile-libfuzzer-coverage-x86_64": C++ compiler .......................... Clang 18.1.8, /usr/local/bin/clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CMAKE_BUILD_TYPE ...................... RelWithDebInfo Step #3 - "compile-libfuzzer-coverage-x86_64": Preprocessor defined macros ........... FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION _LIBCPP_HARDENING_MODE=_LIBCPP_HARDENING_MODE_DEBUG BOOST_MULTI_INDEX_ENABLE_SAFE_MODE Step #3 - "compile-libfuzzer-coverage-x86_64": C++ compiler flags .................... -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++20 -fPIC -fdebug-prefix-map=/src/bitcoin-core/src=. -fmacro-prefix-map=/src/bitcoin-core/src=. -Wall -Wextra -Wgnu -Wformat -Wformat-security -Wvla -Wshadow-field -Wthread-safety -Wloop-analysis -Wredundant-decls -Wunused-member-function -Wdate-time -Wconditional-uninitialized -Woverloaded-virtual -Wsuggest-override -Wimplicit-fallthrough -Wunreachable-code -Wdocumentation -Wself-assign -Wundef -Wno-unused-parameter -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=3 -Wstack-protector -fstack-protector-all -fcf-protection=full -fstack-clash-protection Step #3 - "compile-libfuzzer-coverage-x86_64": Linker flags .......................... -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fsanitize=fuzzer -fstack-protector-all -fcf-protection=full -fstack-clash-protection -Wl,-z,relro -Wl,-z,now -Wl,-z,separate-code -fPIE -pie Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": NOTE: The summary above may not exactly match the final applied build flags Step #3 - "compile-libfuzzer-coverage-x86_64": if any additional CMAKE_* or environment variables have been modified. Step #3 - "compile-libfuzzer-coverage-x86_64": To see the exact flags applied, build with the --verbose option. Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Attempt to harden executables ......... ON Step #3 - "compile-libfuzzer-coverage-x86_64": Treat compiler warnings as errors ..... OFF Step #3 - "compile-libfuzzer-coverage-x86_64": Use ccache for compiling .............. ON Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (9.3s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.1s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/bitcoin-core/build_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake --build build_fuzz -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building CXX object CMakeFiles/crc32c_sse42.dir/src/crc32c/src/crc32c_sse42.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building CXX object src/univalue/CMakeFiles/univalue.dir/lib/univalue.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Generating bitcoin-build-info.h Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building CXX object src/univalue/CMakeFiles/univalue.dir/lib/univalue_get.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building CXX object src/univalue/CMakeFiles/univalue.dir/lib/univalue_read.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building C object src/secp256k1/src/CMakeFiles/secp256k1_precomputed.dir/precomputed_ecmult.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_1byte.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto_sse41.dir/sha256_sse41.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building C object src/secp256k1/src/CMakeFiles/secp256k1_precomputed.dir/precomputed_ecmult_gen.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_3bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building CXX object src/univalue/CMakeFiles/univalue.dir/lib/univalue_write.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_2bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto_avx2.dir/sha256_avx2.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto_x86_shani.dir/sha256_x86_shani.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_5bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_4bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_6bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_7bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Building CXX object CMakeFiles/minisketch_clmul.dir/src/minisketch/src/fields/clmul_8bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Linking CXX static library libcrc32c_sse42.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Built target crc32c_sse42 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Building CXX object CMakeFiles/crc32c.dir/src/crc32c/src/crc32c.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object CMakeFiles/crc32c.dir/src/crc32c/src/crc32c_portable.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Built target generate_build_info Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object src/CMakeFiles/bitcoin_clientversion.dir/clientversion.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Linking CXX static library libbitcoin_crypto_x86_shani.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Built target bitcoin_crypto_x86_shani Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Linking CXX static library libcrc32c.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Built target crc32c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/builder.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/c.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/db_impl.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/db_iter.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/dbformat.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/filename.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/dumpfile.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/log_reader.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/memtable.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/log_writer.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/repair.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/table_cache.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/version_edit.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/version_set.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/db/write_batch.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/block.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/filter_block.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/iterator.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/block_builder.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/format.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/merger.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/table_builder.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/table.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/table/two_level_iterator.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/arena.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/bloom.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/cache.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/coding.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Built target secp256k1_precomputed Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Building C object src/secp256k1/src/CMakeFiles/secp256k1.dir/secp256k1.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/comparator.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Linking CXX static library libunivalue.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Built target univalue Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building CXX object src/test/util/CMakeFiles/test_util.dir/blockfilter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/env.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/crc32c.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Built target bitcoin_clientversion Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/env_posix.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building CXX object src/CMakeFiles/bitcoin_cli.dir/compat/stdin.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/filter_policy.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building CXX object src/CMakeFiles/bitcoin_cli.dir/rpc/client.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/hash.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/histogram.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/logging.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/options.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/util/status.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building CXX object CMakeFiles/leveldb.dir/src/leveldb/helpers/memenv/memenv.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building CXX object src/test/util/CMakeFiles/test_util.dir/coins.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building CXX object src/test/util/CMakeFiles/test_util.dir/index.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building CXX object src/test/util/CMakeFiles/test_util.dir/json.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building CXX object src/test/util/CMakeFiles/test_util.dir/logging.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Built target minisketch_clmul Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/minisketch.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_1byte.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_2bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building CXX object src/test/util/CMakeFiles/test_util.dir/mining.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_3bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_4bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_5bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_6bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 19%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_7bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 19%] Building CXX object CMakeFiles/minisketch.dir/src/minisketch/src/fields/generic_8bytes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building CXX object src/test/util/CMakeFiles/test_util.dir/net.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building CXX object src/test/util/CMakeFiles/test_util.dir/random.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building CXX object src/test/util/CMakeFiles/test_util.dir/script.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building CXX object src/test/util/CMakeFiles/test_util.dir/setup_common.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building CXX object src/test/util/CMakeFiles/test_util.dir/str.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building CXX object src/test/util/CMakeFiles/test_util.dir/transaction_utils.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building CXX object src/test/util/CMakeFiles/test_util.dir/txmempool.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building CXX object src/test/util/CMakeFiles/test_util.dir/validation.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Linking CXX static library libbitcoin_crypto_avx2.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Built target bitcoin_crypto_avx2 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building CXX object src/test/util/CMakeFiles/test_util.dir/__/__/wallet/test/util.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Linking CXX static library libbitcoin_crypto_sse41.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Built target bitcoin_crypto_sse41 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/aes.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/chacha20.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/hex_base.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/hkdf_sha256_32.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/chacha20poly1305.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/hmac_sha256.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/hmac_sha512.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Linking C static library ../lib/libsecp256k1.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Built target secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/muhash.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/poly1305.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/ripemd160.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/sha1.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/sha256.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/sha256_sse4.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/sha3.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/sha512.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/siphash.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Building CXX object src/crypto/CMakeFiles/bitcoin_crypto.dir/__/support/cleanse.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Linking CXX static library libleveldb.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Built target leveldb Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Linking CXX static library libbitcoin_cli.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Built target bitcoin_cli Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Linking CXX static library libbitcoin_crypto.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Built target bitcoin_crypto Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/arith_uint256.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/consensus/merkle.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/hash.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/consensus/tx_check.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/asmap.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/batchpriority.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/primitives/transaction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 27%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/script/interpreter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 27%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/pubkey.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/primitives/block.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/bip32.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/bytevectorhash.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/chaintype.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/check.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/exception.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/script/script_error.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/script/script.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/feefrac.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/fs.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building CXX object src/CMakeFiles/bitcoin_consensus.dir/uint256.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/fs_helpers.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/hasher.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/moneystr.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Linking CXX static library libminisketch.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Built target minisketch Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/rbf.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/readwritefile.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/serfloat.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/signalinterrupt.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/sock.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/strencodings.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/string.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/syserror.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/thread.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/threadinterrupt.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/threadnames.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/time.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/tokenpipe.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/__/logging.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/__/random.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/__/randomenv.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/__/streams.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/__/support/lockedpool.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Building CXX object src/util/CMakeFiles/bitcoin_util.dir/__/sync.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Linking CXX static library libbitcoin_consensus.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Built target bitcoin_consensus Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Linking CXX static library libbitcoin_util.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Built target bitcoin_util Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building CXX object src/CMakeFiles/bitcoin_common.dir/addresstype.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building CXX object src/CMakeFiles/bitcoin_common.dir/base58.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building CXX object src/CMakeFiles/bitcoin_common.dir/bech32.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building CXX object src/CMakeFiles/bitcoin_common.dir/chain.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building CXX object src/CMakeFiles/bitcoin_common.dir/chainparams.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building CXX object src/CMakeFiles/bitcoin_common.dir/chainparamsbase.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/bloom.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building CXX object src/CMakeFiles/bitcoin_common.dir/coins.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/config.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/init.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/interfaces.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/messages.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/netif.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/pcp.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/run_command.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/settings.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/signmessage.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Building CXX object src/CMakeFiles/bitcoin_common.dir/compressor.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 39%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/system.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building CXX object src/CMakeFiles/bitcoin_common.dir/common/url.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building CXX object src/CMakeFiles/bitcoin_common.dir/core_read.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building CXX object src/CMakeFiles/bitcoin_common.dir/core_write.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building CXX object src/CMakeFiles/bitcoin_common.dir/deploymentinfo.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building CXX object src/CMakeFiles/bitcoin_common.dir/external_signer.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building CXX object src/CMakeFiles/bitcoin_common.dir/kernel/chainparams.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building CXX object src/CMakeFiles/bitcoin_common.dir/init/common.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building CXX object src/CMakeFiles/bitcoin_common.dir/key.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building CXX object src/CMakeFiles/bitcoin_common.dir/key_io.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building CXX object src/CMakeFiles/bitcoin_common.dir/merkleblock.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building CXX object src/CMakeFiles/bitcoin_common.dir/net_permissions.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building CXX object src/CMakeFiles/bitcoin_common.dir/net_types.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building CXX object src/CMakeFiles/bitcoin_common.dir/netaddress.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building CXX object src/CMakeFiles/bitcoin_common.dir/netbase.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building CXX object src/CMakeFiles/bitcoin_common.dir/outputtype.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building CXX object src/CMakeFiles/bitcoin_common.dir/policy/feerate.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building CXX object src/CMakeFiles/bitcoin_common.dir/policy/policy.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building CXX object src/CMakeFiles/bitcoin_common.dir/pow.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building CXX object src/CMakeFiles/bitcoin_common.dir/protocol.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building CXX object src/CMakeFiles/bitcoin_common.dir/psbt.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building CXX object src/CMakeFiles/bitcoin_common.dir/rpc/external_signer.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building CXX object src/CMakeFiles/bitcoin_common.dir/rpc/rawtransaction_util.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building CXX object src/CMakeFiles/bitcoin_common.dir/rpc/request.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building CXX object src/CMakeFiles/bitcoin_common.dir/rpc/util.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Linking CXX static library libtest_util.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Built target test_util Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building CXX object src/CMakeFiles/bitcoin_common.dir/scheduler.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building CXX object src/CMakeFiles/bitcoin_common.dir/script/descriptor.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building CXX object src/CMakeFiles/bitcoin_common.dir/script/miniscript.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building CXX object src/CMakeFiles/bitcoin_common.dir/script/parsing.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building CXX object src/CMakeFiles/bitcoin_common.dir/script/sign.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building CXX object src/CMakeFiles/bitcoin_common.dir/script/signingprovider.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building CXX object src/CMakeFiles/bitcoin_common.dir/script/solver.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Linking CXX static library libbitcoin_common.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Built target bitcoin_common Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/coincontrol.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/coinselection.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/context.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/crypter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/db.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/CMakeFiles/bitcoin_node.dir/addrman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/CMakeFiles/bitcoin_node.dir/addrdb.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/CMakeFiles/bitcoin_node.dir/banman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/dump.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/external_signer_scriptpubkeyman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/feebumper.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Building CXX object src/CMakeFiles/bitcoin_node.dir/bip324.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building CXX object src/CMakeFiles/bitcoin_node.dir/blockencodings.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/fees.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/interfaces.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building CXX object src/CMakeFiles/bitcoin_node.dir/blockfilter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building CXX object src/CMakeFiles/bitcoin_node.dir/consensus/tx_verify.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/load.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Building CXX object src/CMakeFiles/bitcoin_node.dir/dbwrapper.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building CXX object src/CMakeFiles/bitcoin_node.dir/deploymentstatus.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building CXX object src/CMakeFiles/bitcoin_node.dir/flatfile.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building CXX object src/CMakeFiles/bitcoin_node.dir/headerssync.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/migrate.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/receive.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building CXX object src/CMakeFiles/bitcoin_node.dir/httprpc.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/addresses.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/backup.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object src/CMakeFiles/bitcoin_node.dir/httpserver.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object src/CMakeFiles/bitcoin_node.dir/i2p.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object src/CMakeFiles/bitcoin_node.dir/index/base.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/coins.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object src/CMakeFiles/bitcoin_node.dir/index/blockfilterindex.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/encrypt.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object src/CMakeFiles/bitcoin_node.dir/index/coinstatsindex.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/signmessage.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building CXX object src/CMakeFiles/bitcoin_node.dir/index/txindex.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building CXX object src/CMakeFiles/bitcoin_node.dir/init.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building CXX object src/CMakeFiles/bitcoin_node.dir/kernel/chain.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building CXX object src/CMakeFiles/bitcoin_node.dir/kernel/checks.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building CXX object src/CMakeFiles/bitcoin_node.dir/kernel/coinstats.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building CXX object src/CMakeFiles/bitcoin_node.dir/kernel/context.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building CXX object src/CMakeFiles/bitcoin_node.dir/kernel/cs_main.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/spend.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/transactions.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building CXX object src/CMakeFiles/bitcoin_node.dir/kernel/disconnected_transactions.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building CXX object src/CMakeFiles/bitcoin_node.dir/kernel/mempool_removal_reason.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building CXX object src/CMakeFiles/bitcoin_node.dir/mapport.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building CXX object src/CMakeFiles/bitcoin_node.dir/net.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building CXX object src/CMakeFiles/bitcoin_node.dir/net_processing.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building CXX object src/CMakeFiles/bitcoin_node.dir/netgroup.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/abort.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/util.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/blockmanager_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/blockstorage.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/caches.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/chainstate.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/chainstatemanager_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/rpc/wallet.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 58%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/scriptpubkeyman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/coin.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/coins_view_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/connection_types.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/context.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/spend.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/transaction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/database_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/eviction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/interface_ui.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/interfaces.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/kernel_notifications.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/mempool_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/mempool_persist.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/wallet.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/walletdb.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/mempool_persist_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/miner.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/mini_miner.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/walletutil.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building CXX object src/wallet/CMakeFiles/bitcoin_wallet.dir/sqlite.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/minisketchwrapper.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 63%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/peerman_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 63%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/psbt.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 63%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/timeoffsets.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 63%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/transaction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/txdownloadman_impl.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/txreconciliation.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/utxo_snapshot.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building CXX object src/CMakeFiles/bitcoin_node.dir/node/warnings.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building CXX object src/CMakeFiles/bitcoin_node.dir/noui.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building CXX object src/CMakeFiles/bitcoin_node.dir/policy/ephemeral_policy.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building CXX object src/CMakeFiles/bitcoin_node.dir/policy/fees.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building CXX object src/CMakeFiles/bitcoin_node.dir/policy/fees_args.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building CXX object src/CMakeFiles/bitcoin_node.dir/policy/packages.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building CXX object src/CMakeFiles/bitcoin_node.dir/policy/rbf.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building CXX object src/CMakeFiles/bitcoin_node.dir/policy/settings.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building CXX object src/CMakeFiles/bitcoin_node.dir/policy/truc_policy.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rest.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/blockchain.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/fees.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/mempool.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/mining.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/net.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/node.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/output_script.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/rawtransaction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/server.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/server_util.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/signmessage.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building CXX object src/CMakeFiles/bitcoin_node.dir/rpc/txoutproof.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building CXX object src/CMakeFiles/bitcoin_node.dir/script/sigcache.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building CXX object src/CMakeFiles/bitcoin_node.dir/signet.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building CXX object src/CMakeFiles/bitcoin_node.dir/torcontrol.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building CXX object src/CMakeFiles/bitcoin_node.dir/txdb.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building CXX object src/CMakeFiles/bitcoin_node.dir/txmempool.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building CXX object src/CMakeFiles/bitcoin_node.dir/txorphanage.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building CXX object src/CMakeFiles/bitcoin_node.dir/txrequest.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building CXX object src/CMakeFiles/bitcoin_node.dir/validation.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building CXX object src/CMakeFiles/bitcoin_node.dir/validationinterface.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building CXX object src/CMakeFiles/bitcoin_node.dir/versionbits.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building CXX object src/CMakeFiles/bitcoin_node.dir/wallet/init.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Linking CXX static library libbitcoin_node.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Built target bitcoin_node Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building CXX object src/test/fuzz/util/CMakeFiles/test_fuzz.dir/check_globals.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building CXX object src/test/fuzz/util/CMakeFiles/test_fuzz.dir/descriptor.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building CXX object src/test/fuzz/util/CMakeFiles/test_fuzz.dir/mempool.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building CXX object src/test/fuzz/util/CMakeFiles/test_fuzz.dir/net.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Building CXX object src/test/fuzz/util/CMakeFiles/test_fuzz.dir/__/fuzz.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Building CXX object src/test/fuzz/util/CMakeFiles/test_fuzz.dir/__/util.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Linking CXX static library libbitcoin_wallet.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Built target bitcoin_wallet Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Linking CXX static library libtest_fuzz.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Built target test_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/addition_overflow.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/addrman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/asmap.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/asmap_direct.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/base_encode_decode.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/autofile.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/banman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/bech32.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/bip324.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/bitdeque.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/bitset.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/block.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/block_index.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/block_header.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/blockfilter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/bloom_filter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/buffered_file.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/chain.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/checkqueue.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/cluster_linearize.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/coins_view.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/coinscache_sim.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/connman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_aes256.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_aes256cbc.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_chacha20.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_chacha20poly1305.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_common.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_poly1305.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_diff_fuzz_chacha20.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/crypto_hkdf_hmac_sha256_l32.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/cuckoocache.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/decode_tx.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/descriptor_parse.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/deserialize.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/eval_script.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/feefrac.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/fee_rate.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/feeratediagram.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/fees.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/flatfile.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/float.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/golomb_rice.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/headerssync.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/hex.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/http_request.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/i2p.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/integer.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/key.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/key_io.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/kitchen_sink.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/load_external_block_file.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/locale.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/merkleblock.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/message.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/miniscript.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/minisketch.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/mini_miner.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/muhash.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/multiplication_overflow.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/net.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 86%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/net_permissions.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 86%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/netaddress.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 86%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/netbase_dns_lookup.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 86%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/node_eviction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 86%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/overflow.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/p2p_handshake.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/p2p_headers_presync.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/p2p_transport_serialization.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/package_eval.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/parse_hd_keypath.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/parse_iso8601.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/parse_numbers.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/parse_script.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/parse_univalue.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/partially_downloaded_block.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/policy_estimator.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/policy_estimator_io.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/poolresource.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/pow.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/prevector.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/primitives_transaction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/process_message.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/process_messages.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/protocol.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/psbt.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/random.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/rbf.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/rolling_bloom_filter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/rpc.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_assets_test_minimizer.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_descriptor_cache.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_flags.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_format.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_interpreter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_ops.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_parsing.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_sigcache.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/script_sign.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/scriptnum_ops.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/secp256k1_ec_seckey_import_export_der.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/secp256k1_ecdsa_signature_parse_der_lax.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/signature_checker.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/signet.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/socks5.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/span.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/string.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/strprintf.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/system.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/timeoffsets.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/torcontrol.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/transaction.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/txdownloadman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/tx_in.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/tx_out.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/tx_pool.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/txorphan.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/txrequest.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/utxo_snapshot.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/utxo_total_supply.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/validation_load_mempool.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/vecdeque.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/versionbits.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/coincontrol.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/coinselection.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/crypter.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/fees.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/notifications.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/scriptpubkeyman.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/spend.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Building CXX object src/test/fuzz/CMakeFiles/fuzz.dir/__/__/wallet/test/fuzz/wallet_bdb_parser.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking CXX executable fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + WRITE_ALL_FUZZ_TARGETS_AND_ABORT=/tmp/a Step #3 - "compile-libfuzzer-coverage-x86_64": + ./build_fuzz/src/test/fuzz/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": Writing all fuzz target names to '/tmp/a'. Step #3 - "compile-libfuzzer-coverage-x86_64": + readarray FUZZ_TARGETS Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + export MAGIC_STR=b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157 Step #3 - "compile-libfuzzer-coverage-x86_64": + MAGIC_STR=b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157 Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's|std::getenv("FUZZ")|"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157"|g' ./src/test/fuzz/fuzz.cpp Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake --build build_fuzz -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Generating bitcoin-build-info.h Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Built target crc32c_sse42 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Built target secp256k1_precomputed Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Built target bitcoin_crypto_x86_shani Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Built target bitcoin_crypto_sse41 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Built target bitcoin_crypto_avx2 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Built target secp256k1 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Built target minisketch_clmul Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Built target crc32c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Built target generate_build_info Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Built target univalue Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Built target bitcoin_clientversion Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Built target minisketch Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Built target bitcoin_cli Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Built target bitcoin_crypto Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Built target bitcoin_consensus Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Built target test_util Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Built target leveldb Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Built target bitcoin_util Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Built target bitcoin_common Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Built target bitcoin_wallet Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Built target bitcoin_node Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Building CXX object src/test/fuzz/util/CMakeFiles/test_fuzz.dir/__/fuzz.cpp.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Linking CXX static library libtest_fuzz.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Built target test_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Linking CXX executable fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 85G 218G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"addition_overflow\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/addition_overflow",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/addition_overflow Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d addition_overflow ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/addition_overflow_seed_corpus.zip addition_overflow Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 85G 217G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"addr_info_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/addr_info_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/addr_info_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d addr_info_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/addr_info_deserialize_seed_corpus.zip addr_info_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 86G 217G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"address_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/address_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/address_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d address_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/address_deserialize_seed_corpus.zip address_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 86G 217G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"addrman\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/addrman",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/addrman Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d addrman ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/addrman_seed_corpus.zip addrman Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 86G 217G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"addrman_serdeser\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/addrman_serdeser",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/addrman_serdeser Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d addrman_serdeser ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/addrman_serdeser_seed_corpus.zip addrman_serdeser Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 86G 217G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"asmap\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/asmap",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/asmap Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d asmap ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/asmap_seed_corpus.zip asmap Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 86G 217G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"asmap_direct\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/asmap_direct",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/asmap_direct Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d asmap_direct ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/asmap_direct_seed_corpus.zip asmap_direct Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 86G 217G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"autofile\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/autofile",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/autofile Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d autofile ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/autofile_seed_corpus.zip autofile Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 86G 216G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"banman\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/banman",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/banman Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d banman ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/banman_seed_corpus.zip banman Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 87G 216G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"base_encode_decode\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/base_encode_decode",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/base_encode_decode Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d base_encode_decode ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/base_encode_decode_seed_corpus.zip base_encode_decode Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 87G 216G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"bech32\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/bech32",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/bech32 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d bech32 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/bech32_seed_corpus.zip bech32 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 87G 216G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"bip324_cipher_roundtrip\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/bip324_cipher_roundtrip",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/bip324_cipher_roundtrip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d bip324_cipher_roundtrip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/bip324_cipher_roundtrip_seed_corpus.zip bip324_cipher_roundtrip Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 87G 216G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"bip324_ecdh\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/bip324_ecdh",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/bip324_ecdh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d bip324_ecdh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/bip324_ecdh_seed_corpus.zip bip324_ecdh Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 87G 216G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"bitdeque\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/bitdeque",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/bitdeque Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d bitdeque ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/bitdeque_seed_corpus.zip bitdeque Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 87G 215G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"bitset\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/bitset",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/bitset Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d bitset ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/bitset_seed_corpus.zip bitset Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 87G 215G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"block\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/block",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/block Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d block ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/block_seed_corpus.zip block Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 88G 215G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"block_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/block_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/block_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d block_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/block_deserialize_seed_corpus.zip block_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 88G 215G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"block_file_info_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/block_file_info_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/block_file_info_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d block_file_info_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/block_file_info_deserialize_seed_corpus.zip block_file_info_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 88G 215G 29% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"block_filter_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/block_filter_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/block_filter_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d block_filter_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/block_filter_deserialize_seed_corpus.zip block_filter_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 88G 215G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"block_header\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/block_header",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/block_header Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d block_header ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/block_header_seed_corpus.zip block_header Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 88G 215G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"block_header_and_short_txids_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/block_header_and_short_txids_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/block_header_and_short_txids_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d block_header_and_short_txids_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/block_header_and_short_txids_deserialize_seed_corpus.zip block_header_and_short_txids_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 88G 214G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"block_index\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/block_index",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/block_index Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d block_index ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/block_index_seed_corpus.zip block_index Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 89G 214G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"blockfilter\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/blockfilter",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/blockfilter Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d blockfilter ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/blockfilter_seed_corpus.zip blockfilter Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 89G 214G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"blockheader_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/blockheader_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/blockheader_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d blockheader_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/blockheader_deserialize_seed_corpus.zip blockheader_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 89G 214G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"blocklocator_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/blocklocator_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/blocklocator_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d blocklocator_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/blocklocator_deserialize_seed_corpus.zip blocklocator_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 89G 214G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"blockmerkleroot\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/blockmerkleroot",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/blockmerkleroot Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d blockmerkleroot ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/blockmerkleroot_seed_corpus.zip blockmerkleroot Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 89G 214G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"blocktransactions_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/blocktransactions_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/blocktransactions_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d blocktransactions_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/blocktransactions_deserialize_seed_corpus.zip blocktransactions_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 89G 213G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"blocktransactionsrequest_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/blocktransactionsrequest_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/blocktransactionsrequest_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d blocktransactionsrequest_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/blocktransactionsrequest_deserialize_seed_corpus.zip blocktransactionsrequest_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 89G 213G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"blockundo_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/blockundo_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/blockundo_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d blockundo_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/blockundo_deserialize_seed_corpus.zip blockundo_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 90G 213G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"bloom_filter\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/bloom_filter",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/bloom_filter Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d bloom_filter ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/bloom_filter_seed_corpus.zip bloom_filter Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 90G 213G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"bloomfilter_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/bloomfilter_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/bloomfilter_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d bloomfilter_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/bloomfilter_deserialize_seed_corpus.zip bloomfilter_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 90G 213G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"buffered_file\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/buffered_file",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/buffered_file Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d buffered_file ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/buffered_file_seed_corpus.zip buffered_file Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 90G 213G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"build_and_compare_feerate_diagram\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/build_and_compare_feerate_diagram",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/build_and_compare_feerate_diagram Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d build_and_compare_feerate_diagram ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/build_and_compare_feerate_diagram_seed_corpus.zip build_and_compare_feerate_diagram Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 90G 213G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"chacha20_split_crypt\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/chacha20_split_crypt",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/chacha20_split_crypt Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d chacha20_split_crypt ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/chacha20_split_crypt_seed_corpus.zip chacha20_split_crypt Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 90G 212G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"chacha20_split_keystream\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/chacha20_split_keystream",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/chacha20_split_keystream Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d chacha20_split_keystream ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/chacha20_split_keystream_seed_corpus.zip chacha20_split_keystream Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 91G 212G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"chain\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/chain",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/chain Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d chain ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/chain_seed_corpus.zip chain Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 91G 212G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"checkqueue\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/checkqueue",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/checkqueue Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d checkqueue ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/checkqueue_seed_corpus.zip checkqueue Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 91G 212G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_ancestor_finder\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_ancestor_finder",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_ancestor_finder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_ancestor_finder ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_ancestor_finder_seed_corpus.zip clusterlin_ancestor_finder Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 91G 212G 30% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_chunking\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_chunking",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_chunking Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_chunking ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_chunking_seed_corpus.zip clusterlin_chunking Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 91G 212G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_components\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_components",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_components Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_components ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_components_seed_corpus.zip clusterlin_components Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 91G 212G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_depgraph_serialization\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_depgraph_serialization",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_depgraph_serialization Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_depgraph_serialization ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_depgraph_serialization_seed_corpus.zip clusterlin_depgraph_serialization Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 91G 211G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_depgraph_sim\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_depgraph_sim",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_depgraph_sim Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_depgraph_sim ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_depgraph_sim_seed_corpus.zip clusterlin_depgraph_sim Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 92G 211G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_linearization_chunking\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_linearization_chunking",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_linearization_chunking Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_linearization_chunking ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_linearization_chunking_seed_corpus.zip clusterlin_linearization_chunking Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 92G 211G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_linearize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_linearize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_linearize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_linearize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_linearize_seed_corpus.zip clusterlin_linearize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 92G 211G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_make_connected\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_make_connected",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_make_connected Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_make_connected ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_make_connected_seed_corpus.zip clusterlin_make_connected Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 92G 211G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_merge\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_merge",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_merge Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_merge ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_merge_seed_corpus.zip clusterlin_merge Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 92G 211G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_postlinearize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_postlinearize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize_seed_corpus.zip clusterlin_postlinearize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 92G 210G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_postlinearize_moved_leaf\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize_moved_leaf",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize_moved_leaf Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_postlinearize_moved_leaf ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize_moved_leaf_seed_corpus.zip clusterlin_postlinearize_moved_leaf Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 92G 210G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_postlinearize_tree\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize_tree",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize_tree Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_postlinearize_tree ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_postlinearize_tree_seed_corpus.zip clusterlin_postlinearize_tree Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 93G 210G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"clusterlin_search_finder\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/clusterlin_search_finder",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/clusterlin_search_finder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d clusterlin_search_finder ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/clusterlin_search_finder_seed_corpus.zip clusterlin_search_finder Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 93G 210G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"coin_grinder\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/coin_grinder",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/coin_grinder Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d coin_grinder ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/coin_grinder_seed_corpus.zip coin_grinder Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 93G 210G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"coin_grinder_is_optimal\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/coin_grinder_is_optimal",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/coin_grinder_is_optimal Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d coin_grinder_is_optimal ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/coin_grinder_is_optimal_seed_corpus.zip coin_grinder_is_optimal Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 93G 210G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"coincontrol\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/coincontrol",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/coincontrol Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d coincontrol ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/coincontrol_seed_corpus.zip coincontrol Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 93G 210G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"coins_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/coins_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/coins_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d coins_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/coins_deserialize_seed_corpus.zip coins_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 93G 209G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"coins_view\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/coins_view",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/coins_view Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d coins_view ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/coins_view_seed_corpus.zip coins_view Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 94G 209G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"coinscache_sim\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/coinscache_sim",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/coinscache_sim Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d coinscache_sim ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/coinscache_sim_seed_corpus.zip coinscache_sim Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 94G 209G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"coinselection\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/coinselection",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/coinselection Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d coinselection ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/coinselection_seed_corpus.zip coinselection Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 94G 209G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"connman\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/connman",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/connman Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d connman ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/connman_seed_corpus.zip connman Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 94G 209G 31% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypter\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypter",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypter Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypter ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypter_seed_corpus.zip crypter Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 94G 209G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_seed_corpus.zip crypto Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 94G 209G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_aeadchacha20poly1305\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_aeadchacha20poly1305",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_aeadchacha20poly1305 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_aeadchacha20poly1305 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_aeadchacha20poly1305_seed_corpus.zip crypto_aeadchacha20poly1305 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 94G 208G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_aes256\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_aes256",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_aes256 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_aes256 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_aes256_seed_corpus.zip crypto_aes256 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 95G 208G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_aes256cbc\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_aes256cbc",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_aes256cbc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_aes256cbc ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_aes256cbc_seed_corpus.zip crypto_aes256cbc Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 95G 208G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_chacha20\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_chacha20",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_chacha20 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_chacha20 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_chacha20_seed_corpus.zip crypto_chacha20 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 95G 208G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_common\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_common",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_common Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_common ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_common_seed_corpus.zip crypto_common Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 95G 208G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_diff_fuzz_chacha20\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_diff_fuzz_chacha20",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_diff_fuzz_chacha20 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_diff_fuzz_chacha20 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_diff_fuzz_chacha20_seed_corpus.zip crypto_diff_fuzz_chacha20 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 95G 208G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_fschacha20\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_fschacha20",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_fschacha20 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_fschacha20 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_fschacha20_seed_corpus.zip crypto_fschacha20 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 95G 207G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_fschacha20poly1305\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_fschacha20poly1305",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_fschacha20poly1305 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_fschacha20poly1305 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_fschacha20poly1305_seed_corpus.zip crypto_fschacha20poly1305 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 96G 207G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_hkdf_hmac_sha256_l32\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_hkdf_hmac_sha256_l32",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_hkdf_hmac_sha256_l32 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_hkdf_hmac_sha256_l32 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_hkdf_hmac_sha256_l32_seed_corpus.zip crypto_hkdf_hmac_sha256_l32 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 96G 207G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_poly1305\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_poly1305",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_poly1305 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_poly1305 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_poly1305_seed_corpus.zip crypto_poly1305 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 96G 207G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"crypto_poly1305_split\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/crypto_poly1305_split",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/crypto_poly1305_split Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d crypto_poly1305_split ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/crypto_poly1305_split_seed_corpus.zip crypto_poly1305_split Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 96G 207G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"cuckoocache\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/cuckoocache",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/cuckoocache Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d cuckoocache ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/cuckoocache_seed_corpus.zip cuckoocache Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 96G 207G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"data_stream_addr_man\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/data_stream_addr_man",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/data_stream_addr_man Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d data_stream_addr_man ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/data_stream_addr_man_seed_corpus.zip data_stream_addr_man Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 96G 207G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"decode_tx\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/decode_tx",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/decode_tx Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d decode_tx ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/decode_tx_seed_corpus.zip decode_tx Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 96G 206G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"descriptor_parse\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/descriptor_parse",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/descriptor_parse Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d descriptor_parse ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/descriptor_parse_seed_corpus.zip descriptor_parse Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 97G 206G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"diskblockindex_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/diskblockindex_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/diskblockindex_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d diskblockindex_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/diskblockindex_deserialize_seed_corpus.zip diskblockindex_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 97G 206G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"ellswift_roundtrip\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/ellswift_roundtrip",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/ellswift_roundtrip Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d ellswift_roundtrip ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/ellswift_roundtrip_seed_corpus.zip ellswift_roundtrip Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 97G 206G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"ephemeral_package_eval\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/ephemeral_package_eval",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/ephemeral_package_eval Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d ephemeral_package_eval ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/ephemeral_package_eval_seed_corpus.zip ephemeral_package_eval Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 97G 206G 32% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"eval_script\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/eval_script",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/eval_script Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d eval_script ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/eval_script_seed_corpus.zip eval_script Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 97G 206G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"fee_rate\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/fee_rate",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fee_rate Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d fee_rate ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/fee_rate_seed_corpus.zip fee_rate Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 97G 206G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"fee_rate_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/fee_rate_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fee_rate_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d fee_rate_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/fee_rate_deserialize_seed_corpus.zip fee_rate_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 97G 205G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"feefrac\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/feefrac",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/feefrac Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d feefrac ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/feefrac_seed_corpus.zip feefrac Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 98G 205G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"fees\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/fees",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/fees Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d fees ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/fees_seed_corpus.zip fees Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 98G 205G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"flat_file_pos_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/flat_file_pos_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/flat_file_pos_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d flat_file_pos_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/flat_file_pos_deserialize_seed_corpus.zip flat_file_pos_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 98G 205G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"flatfile\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/flatfile",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/flatfile Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d flatfile ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/flatfile_seed_corpus.zip flatfile Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 98G 205G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"float\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/float",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/float Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d float ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/float_seed_corpus.zip float Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 98G 205G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"golomb_rice\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/golomb_rice",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/golomb_rice Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d golomb_rice ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/golomb_rice_seed_corpus.zip golomb_rice Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 98G 204G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"headers_sync_state\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/headers_sync_state",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/headers_sync_state Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d headers_sync_state ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/headers_sync_state_seed_corpus.zip headers_sync_state Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 99G 204G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"hex\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/hex",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/hex Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d hex ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/hex_seed_corpus.zip hex Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 99G 204G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"http_request\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/http_request",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/http_request Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d http_request ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/http_request_seed_corpus.zip http_request Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 99G 204G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"i2p\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/i2p",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/i2p Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d i2p ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/i2p_seed_corpus.zip i2p Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 99G 204G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"integer\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/integer",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/integer Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d integer ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/integer_seed_corpus.zip integer Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 99G 204G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"inv_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/inv_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/inv_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d inv_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/inv_deserialize_seed_corpus.zip inv_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 99G 204G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"key\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/key",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/key Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d key ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/key_seed_corpus.zip key Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 99G 203G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"key_io\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/key_io",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/key_io Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d key_io ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/key_io_seed_corpus.zip key_io Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 100G 203G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"key_origin_info_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/key_origin_info_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/key_origin_info_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d key_origin_info_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/key_origin_info_deserialize_seed_corpus.zip key_origin_info_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 100G 203G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"kitchen_sink\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/kitchen_sink",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/kitchen_sink Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d kitchen_sink ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/kitchen_sink_seed_corpus.zip kitchen_sink Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 100G 203G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"load_external_block_file\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/load_external_block_file",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/load_external_block_file Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d load_external_block_file ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/load_external_block_file_seed_corpus.zip load_external_block_file Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 100G 203G 33% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"local_address\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/local_address",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/local_address Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d local_address ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/local_address_seed_corpus.zip local_address Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 100G 203G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"locale\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/locale",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/locale Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d locale ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/locale_seed_corpus.zip locale Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 100G 203G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"merkle_block_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/merkle_block_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/merkle_block_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d merkle_block_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/merkle_block_deserialize_seed_corpus.zip merkle_block_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 100G 202G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"merkleblock\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/merkleblock",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/merkleblock Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d merkleblock ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/merkleblock_seed_corpus.zip merkleblock Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 101G 202G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"message\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/message",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/message Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d message ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/message_seed_corpus.zip message Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 101G 202G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"messageheader_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/messageheader_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/messageheader_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d messageheader_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/messageheader_deserialize_seed_corpus.zip messageheader_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 101G 202G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"mini_miner\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/mini_miner",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/mini_miner Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d mini_miner ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/mini_miner_seed_corpus.zip mini_miner Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 101G 202G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"mini_miner_selection\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/mini_miner_selection",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/mini_miner_selection Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d mini_miner_selection ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/mini_miner_selection_seed_corpus.zip mini_miner_selection Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 101G 202G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"miniscript_script\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/miniscript_script",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/miniscript_script Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d miniscript_script ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/miniscript_script_seed_corpus.zip miniscript_script Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 101G 201G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"miniscript_smart\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/miniscript_smart",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/miniscript_smart Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d miniscript_smart ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/miniscript_smart_seed_corpus.zip miniscript_smart Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 102G 201G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"miniscript_stable\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/miniscript_stable",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/miniscript_stable Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d miniscript_stable ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/miniscript_stable_seed_corpus.zip miniscript_stable Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 102G 201G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"miniscript_string\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/miniscript_string",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/miniscript_string Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d miniscript_string ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/miniscript_string_seed_corpus.zip miniscript_string Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 102G 201G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"minisketch\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/minisketch",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/minisketch Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d minisketch ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/minisketch_seed_corpus.zip minisketch Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 102G 201G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"mocked_descriptor_parse\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/mocked_descriptor_parse",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/mocked_descriptor_parse Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d mocked_descriptor_parse ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/mocked_descriptor_parse_seed_corpus.zip mocked_descriptor_parse Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 102G 201G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"muhash\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/muhash",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/muhash Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d muhash ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/muhash_seed_corpus.zip muhash Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 102G 201G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"multiplication_overflow\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/multiplication_overflow",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/multiplication_overflow Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d multiplication_overflow ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/multiplication_overflow_seed_corpus.zip multiplication_overflow Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 102G 200G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"net\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/net",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/net Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d net ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/net_seed_corpus.zip net Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 103G 200G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"net_permissions\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/net_permissions",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/net_permissions Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d net_permissions ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/net_permissions_seed_corpus.zip net_permissions Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 103G 200G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"netaddr_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/netaddr_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/netaddr_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d netaddr_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/netaddr_deserialize_seed_corpus.zip netaddr_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 103G 200G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"netaddress\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/netaddress",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/netaddress Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d netaddress ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/netaddress_seed_corpus.zip netaddress Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 103G 200G 34% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"netbase_dns_lookup\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/netbase_dns_lookup",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/netbase_dns_lookup Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d netbase_dns_lookup ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/netbase_dns_lookup_seed_corpus.zip netbase_dns_lookup Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 103G 200G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"node_eviction\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/node_eviction",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/node_eviction Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d node_eviction ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/node_eviction_seed_corpus.zip node_eviction Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 103G 199G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"out_point_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/out_point_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/out_point_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d out_point_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/out_point_deserialize_seed_corpus.zip out_point_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 103G 199G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"overflow\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/overflow",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/overflow Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d overflow ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 104G 199G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"p2p_handshake\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/p2p_handshake",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/p2p_handshake Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d p2p_handshake ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/p2p_handshake_seed_corpus.zip p2p_handshake Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 104G 199G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"p2p_headers_presync\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/p2p_headers_presync",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/p2p_headers_presync Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d p2p_headers_presync ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/p2p_headers_presync_seed_corpus.zip p2p_headers_presync Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 104G 199G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"p2p_transport_bidirectional\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d p2p_transport_bidirectional ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional_seed_corpus.zip p2p_transport_bidirectional Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 104G 199G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"p2p_transport_bidirectional_v1v2\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional_v1v2",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional_v1v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d p2p_transport_bidirectional_v1v2 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional_v1v2_seed_corpus.zip p2p_transport_bidirectional_v1v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 104G 199G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"p2p_transport_bidirectional_v2\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional_v2",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional_v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d p2p_transport_bidirectional_v2 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_bidirectional_v2_seed_corpus.zip p2p_transport_bidirectional_v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 104G 198G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"p2p_transport_serialization\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/p2p_transport_serialization",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_serialization Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d p2p_transport_serialization ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/p2p_transport_serialization_seed_corpus.zip p2p_transport_serialization Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 105G 198G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"package_rbf\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/package_rbf",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/package_rbf Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d package_rbf ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/package_rbf_seed_corpus.zip package_rbf Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 105G 198G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"parse_hd_keypath\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/parse_hd_keypath",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/parse_hd_keypath Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d parse_hd_keypath ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/parse_hd_keypath_seed_corpus.zip parse_hd_keypath Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 105G 198G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"parse_iso8601\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/parse_iso8601",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/parse_iso8601 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d parse_iso8601 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/parse_iso8601_seed_corpus.zip parse_iso8601 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 105G 198G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"parse_numbers\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/parse_numbers",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/parse_numbers Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d parse_numbers ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/parse_numbers_seed_corpus.zip parse_numbers Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 105G 198G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"parse_script\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/parse_script",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/parse_script Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d parse_script ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/parse_script_seed_corpus.zip parse_script Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 105G 198G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"parse_univalue\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/parse_univalue",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/parse_univalue Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d parse_univalue ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/parse_univalue_seed_corpus.zip parse_univalue Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 105G 197G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"partial_merkle_tree_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/partial_merkle_tree_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/partial_merkle_tree_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d partial_merkle_tree_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/partial_merkle_tree_deserialize_seed_corpus.zip partial_merkle_tree_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 106G 197G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"partially_downloaded_block\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/partially_downloaded_block",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/partially_downloaded_block Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d partially_downloaded_block ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/partially_downloaded_block_seed_corpus.zip partially_downloaded_block Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 106G 197G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"partially_signed_transaction_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/partially_signed_transaction_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/partially_signed_transaction_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d partially_signed_transaction_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/partially_signed_transaction_deserialize_seed_corpus.zip partially_signed_transaction_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 106G 197G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"policy_estimator\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/policy_estimator",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/policy_estimator Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d policy_estimator ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/policy_estimator_seed_corpus.zip policy_estimator Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 106G 197G 35% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"policy_estimator_io\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/policy_estimator_io",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/policy_estimator_io Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d policy_estimator_io ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/policy_estimator_io_seed_corpus.zip policy_estimator_io Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 106G 197G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"pool_resource\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/pool_resource",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/pool_resource Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d pool_resource ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/pool_resource_seed_corpus.zip pool_resource Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 106G 196G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"pow\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/pow",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/pow Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d pow ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/pow_seed_corpus.zip pow Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 106G 196G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"pow_transition\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/pow_transition",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/pow_transition Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d pow_transition ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/pow_transition_seed_corpus.zip pow_transition Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 107G 196G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"prefilled_transaction_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/prefilled_transaction_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/prefilled_transaction_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d prefilled_transaction_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/prefilled_transaction_deserialize_seed_corpus.zip prefilled_transaction_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 107G 196G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"prevector\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/prevector",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/prevector Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d prevector ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/prevector_seed_corpus.zip prevector Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 107G 196G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"primitives_transaction\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/primitives_transaction",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/primitives_transaction Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d primitives_transaction ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/primitives_transaction_seed_corpus.zip primitives_transaction Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 107G 196G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"process_message\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/process_message",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/process_message Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d process_message ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/process_message_seed_corpus.zip process_message Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 107G 196G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"process_messages\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/process_messages",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/process_messages Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d process_messages ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/process_messages_seed_corpus.zip process_messages Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 107G 195G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"protocol\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/protocol",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/protocol Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d protocol ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/protocol_seed_corpus.zip protocol Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 108G 195G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"psbt\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/psbt",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/psbt Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d psbt ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/psbt_seed_corpus.zip psbt Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 108G 195G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"psbt_input_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/psbt_input_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/psbt_input_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d psbt_input_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/psbt_input_deserialize_seed_corpus.zip psbt_input_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 108G 195G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"psbt_output_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/psbt_output_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/psbt_output_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d psbt_output_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/psbt_output_deserialize_seed_corpus.zip psbt_output_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 108G 195G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"pub_key_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/pub_key_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/pub_key_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d pub_key_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/pub_key_deserialize_seed_corpus.zip pub_key_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 108G 195G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"random\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/random",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/random Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d random ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/random_seed_corpus.zip random Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 108G 195G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"rbf\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/rbf",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/rbf Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d rbf ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/rbf_seed_corpus.zip rbf Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 108G 194G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"rolling_bloom_filter\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/rolling_bloom_filter",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/rolling_bloom_filter Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d rolling_bloom_filter ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/rolling_bloom_filter_seed_corpus.zip rolling_bloom_filter Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 109G 194G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"rpc\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/rpc",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/rpc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d rpc ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/rpc_seed_corpus.zip rpc Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 109G 194G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_seed_corpus.zip script Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 109G 194G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_descriptor_cache\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_descriptor_cache",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_descriptor_cache Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_descriptor_cache ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_descriptor_cache_seed_corpus.zip script_descriptor_cache Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 109G 194G 36% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_deserialize_seed_corpus.zip script_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 109G 194G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_flags\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_flags",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_flags Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_flags ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_flags_seed_corpus.zip script_flags Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 109G 193G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_format\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_format",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_format Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_format ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_format_seed_corpus.zip script_format Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 110G 193G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_interpreter\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_interpreter",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_interpreter Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_interpreter ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_interpreter_seed_corpus.zip script_interpreter Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 110G 193G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_ops\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_ops",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_ops Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_ops ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_ops_seed_corpus.zip script_ops Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 110G 193G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_parsing\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_parsing",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_parsing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_parsing ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_parsing_seed_corpus.zip script_parsing Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 110G 193G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_sigcache\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_sigcache",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_sigcache Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_sigcache ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_sigcache_seed_corpus.zip script_sigcache Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 110G 193G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"script_sign\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/script_sign",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/script_sign Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d script_sign ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/script_sign_seed_corpus.zip script_sign Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 110G 193G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"scriptnum_ops\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/scriptnum_ops",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/scriptnum_ops Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d scriptnum_ops ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/scriptnum_ops_seed_corpus.zip scriptnum_ops Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 110G 192G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"scriptpubkeyman\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/scriptpubkeyman",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/scriptpubkeyman Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d scriptpubkeyman ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/scriptpubkeyman_seed_corpus.zip scriptpubkeyman Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 111G 192G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"secp256k1_ec_seckey_import_export_der\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/secp256k1_ec_seckey_import_export_der",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/secp256k1_ec_seckey_import_export_der Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d secp256k1_ec_seckey_import_export_der ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/secp256k1_ec_seckey_import_export_der_seed_corpus.zip secp256k1_ec_seckey_import_export_der Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 111G 192G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"secp256k1_ecdsa_signature_parse_der_lax\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/secp256k1_ecdsa_signature_parse_der_lax",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/secp256k1_ecdsa_signature_parse_der_lax Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d secp256k1_ecdsa_signature_parse_der_lax ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/secp256k1_ecdsa_signature_parse_der_lax_seed_corpus.zip secp256k1_ecdsa_signature_parse_der_lax Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 111G 192G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"service_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/service_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/service_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d service_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/service_deserialize_seed_corpus.zip service_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 111G 192G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"signature_checker\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/signature_checker",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/signature_checker Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d signature_checker ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/signature_checker_seed_corpus.zip signature_checker Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 111G 192G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"signet\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/signet",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/signet Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d signet ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/signet_seed_corpus.zip signet Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 111G 191G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"snapshotmetadata_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/snapshotmetadata_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/snapshotmetadata_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d snapshotmetadata_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/snapshotmetadata_deserialize_seed_corpus.zip snapshotmetadata_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 111G 191G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"socks5\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/socks5",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/socks5 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d socks5 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/socks5_seed_corpus.zip socks5 Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 112G 191G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"span\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/span",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/span Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d span ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/span_seed_corpus.zip span Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 112G 191G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"str_printf\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/str_printf",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/str_printf Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d str_printf ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/str_printf_seed_corpus.zip str_printf Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 112G 191G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"string\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/string",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/string Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d string ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/string_seed_corpus.zip string Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 112G 191G 37% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"system\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/system",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/system Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d system ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/system_seed_corpus.zip system Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 112G 191G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"timeoffsets\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/timeoffsets",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/timeoffsets Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d timeoffsets ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/timeoffsets_seed_corpus.zip timeoffsets Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 112G 190G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"torcontrol\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/torcontrol",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/torcontrol Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d torcontrol ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/torcontrol_seed_corpus.zip torcontrol Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 113G 190G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"transaction\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/transaction",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/transaction Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d transaction ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/transaction_seed_corpus.zip transaction Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 113G 190G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"tx_in\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/tx_in",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/tx_in Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d tx_in ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/tx_in_seed_corpus.zip tx_in Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 113G 190G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"tx_in_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/tx_in_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/tx_in_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d tx_in_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/tx_in_deserialize_seed_corpus.zip tx_in_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 113G 190G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"tx_out\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/tx_out",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/tx_out Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d tx_out ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/tx_out_seed_corpus.zip tx_out Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 113G 190G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"tx_package_eval\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/tx_package_eval",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/tx_package_eval Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d tx_package_eval ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/tx_package_eval_seed_corpus.zip tx_package_eval Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 113G 190G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"tx_pool\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/tx_pool",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/tx_pool Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d tx_pool ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/tx_pool_seed_corpus.zip tx_pool Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 113G 189G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"tx_pool_standard\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/tx_pool_standard",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/tx_pool_standard Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d tx_pool_standard ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/tx_pool_standard_seed_corpus.zip tx_pool_standard Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 114G 189G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"txdownloadman\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/txdownloadman",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/txdownloadman Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d txdownloadman ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/txdownloadman_seed_corpus.zip txdownloadman Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 114G 189G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"txdownloadman_impl\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/txdownloadman_impl",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/txdownloadman_impl Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d txdownloadman_impl ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/txdownloadman_impl_seed_corpus.zip txdownloadman_impl Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 114G 189G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"txorphan\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/txorphan",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/txorphan Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d txorphan ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/txorphan_seed_corpus.zip txorphan Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 114G 189G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"txoutcompressor_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/txoutcompressor_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/txoutcompressor_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d txoutcompressor_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/txoutcompressor_deserialize_seed_corpus.zip txoutcompressor_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 114G 189G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"txrequest\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/txrequest",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/txrequest Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d txrequest ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/txrequest_seed_corpus.zip txrequest Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 114G 188G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"txundo_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/txundo_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/txundo_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d txundo_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/txundo_deserialize_seed_corpus.zip txundo_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 115G 188G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"uint160_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/uint160_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/uint160_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d uint160_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/uint160_deserialize_seed_corpus.zip uint160_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 115G 188G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"uint256_deserialize\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/uint256_deserialize",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/uint256_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d uint256_deserialize ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/uint256_deserialize_seed_corpus.zip uint256_deserialize Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 115G 188G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"utxo_snapshot\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/utxo_snapshot",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/utxo_snapshot Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d utxo_snapshot ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/utxo_snapshot_seed_corpus.zip utxo_snapshot Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 115G 188G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"utxo_snapshot_invalid\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/utxo_snapshot_invalid",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/utxo_snapshot_invalid Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d utxo_snapshot_invalid ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/utxo_snapshot_invalid_seed_corpus.zip utxo_snapshot_invalid Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 115G 188G 38% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"utxo_total_supply\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/utxo_total_supply",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/utxo_total_supply Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d utxo_total_supply ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/utxo_total_supply_seed_corpus.zip utxo_total_supply Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 115G 188G 39% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"validation_load_mempool\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/validation_load_mempool",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/validation_load_mempool Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d validation_load_mempool ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/validation_load_mempool_seed_corpus.zip validation_load_mempool Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 115G 187G 39% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"vecdeque\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/vecdeque",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/vecdeque Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d vecdeque ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/vecdeque_seed_corpus.zip vecdeque Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 116G 187G 39% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"versionbits\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/versionbits",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/versionbits Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d versionbits ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/versionbits_seed_corpus.zip versionbits Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 116G 187G 39% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"wallet_bdb_parser\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/wallet_bdb_parser",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/wallet_bdb_parser Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d wallet_bdb_parser ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/wallet_bdb_parser_seed_corpus.zip wallet_bdb_parser Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 116G 187G 39% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"wallet_create_transaction\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/wallet_create_transaction",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/wallet_create_transaction Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d wallet_create_transaction ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/wallet_create_transaction_seed_corpus.zip wallet_create_transaction Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 116G 187G 39% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"wallet_fees\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/wallet_fees",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/wallet_fees Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d wallet_fees ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/wallet_fees_seed_corpus.zip wallet_fees Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzz_target in ${FUZZ_TARGETS[@]} Step #3 - "compile-libfuzzer-coverage-x86_64": + df --human-readable ./src Step #3 - "compile-libfuzzer-coverage-x86_64": Filesystem Size Used Avail Use% Mounted on Step #3 - "compile-libfuzzer-coverage-x86_64": overlay 315G 116G 187G 39% / Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 -c 'c_str_target=b"wallet_notifications\x00";c_str_magic=b"b5813eee2abc9d3358151f298b75a72264ffa119d2f71ae7fefa15c4b70b4bc5b38e87e3107a730f25891ea428b2b4fabe7a84f5bfa73c79e0479e085e4ff157";dat=open('\''./build_fuzz/src/test/fuzz/fuzz'\'','\''rb'\'').read();dat=dat.replace(c_str_magic, c_str_target+c_str_magic[len(c_str_target):]);open("/workspace/out/libfuzzer-coverage-x86_64/wallet_notifications",'\''wb'\'').write(dat)' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /workspace/out/libfuzzer-coverage-x86_64/wallet_notifications Step #3 - "compile-libfuzzer-coverage-x86_64": + cd assets/fuzz_corpora Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -d wallet_notifications ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip --recurse-paths --quiet --junk-paths /workspace/out/libfuzzer-coverage-x86_64/wallet_notifications_seed_corpus.zip wallet_notifications Step #3 - "compile-libfuzzer-coverage-x86_64": + cp assets/fuzz_dicts/descriptors.dict assets/fuzz_dicts/i2p.dict assets/fuzz_dicts/net_processing.dict /workspace/out/libfuzzer-coverage-x86_64/ Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: f39d80ca7021: Already exists Step #4: 3f7b104caa94: Already exists Step #4: fb13a18b8d24: Pulling fs layer Step #4: 1e6f70e73fed: Pulling fs layer Step #4: c8c19f1a206d: Pulling fs layer Step #4: 0bccc74b0cc0: Pulling fs layer Step #4: fc73d508fba8: Pulling fs layer Step #4: 076d4d0c30b1: Pulling fs layer Step #4: 1763470f3f22: Pulling fs layer Step #4: 88fe58210e04: Pulling fs layer Step #4: a2d0fdcf2123: Pulling fs layer Step #4: 13a1399396a7: Pulling fs layer Step #4: 0f69f8b7d97d: Pulling fs layer Step #4: 46813ec47842: Pulling fs layer Step #4: 6860115fd42a: Pulling fs layer Step #4: 5256a36340c7: Pulling fs layer Step #4: 465e42175aa3: Pulling fs layer Step #4: 70d46b3445a4: Pulling fs layer Step #4: 2cf450df525b: Pulling fs layer Step #4: e491ffded19a: Pulling fs layer Step #4: 0b512f445b6d: Pulling fs layer Step #4: e9a0aa9dd6dc: Pulling fs layer Step #4: f235e0212358: Pulling fs layer Step #4: 0cdaacbae252: Pulling fs layer Step #4: 36c8153c465a: Pulling fs layer Step #4: 0b512f445b6d: Waiting Step #4: 0f69f8b7d97d: Waiting Step #4: fc73d508fba8: Waiting Step #4: 1763470f3f22: Waiting Step #4: e9a0aa9dd6dc: Waiting Step #4: 0bccc74b0cc0: Waiting Step #4: 88fe58210e04: Waiting Step #4: 6860115fd42a: Waiting Step #4: 13a1399396a7: Waiting Step #4: 46813ec47842: Waiting Step #4: 0cdaacbae252: Waiting Step #4: 36c8153c465a: Waiting Step #4: f235e0212358: Waiting Step #4: 076d4d0c30b1: Waiting Step #4: a2d0fdcf2123: Waiting Step #4: e491ffded19a: Waiting Step #4: 5256a36340c7: Waiting Step #4: 2cf450df525b: Waiting Step #4: c8c19f1a206d: Download complete Step #4: fb13a18b8d24: Verifying Checksum Step #4: fb13a18b8d24: Download complete Step #4: 1e6f70e73fed: Verifying Checksum Step #4: 1e6f70e73fed: Download complete Step #4: fc73d508fba8: Verifying Checksum Step #4: fc73d508fba8: Download complete Step #4: fb13a18b8d24: Pull complete Step #4: 0bccc74b0cc0: Verifying Checksum Step #4: 0bccc74b0cc0: Download complete Step #4: 1763470f3f22: Verifying Checksum Step #4: 1763470f3f22: Download complete Step #4: 88fe58210e04: Download complete Step #4: 1e6f70e73fed: Pull complete Step #4: a2d0fdcf2123: Download complete Step #4: c8c19f1a206d: Pull complete Step #4: 076d4d0c30b1: Verifying Checksum Step #4: 076d4d0c30b1: Download complete Step #4: 0f69f8b7d97d: Verifying Checksum Step #4: 0f69f8b7d97d: Download complete Step #4: 0bccc74b0cc0: Pull complete Step #4: 46813ec47842: Verifying Checksum Step #4: 46813ec47842: Download complete Step #4: 6860115fd42a: Verifying Checksum Step #4: 6860115fd42a: Download complete Step #4: fc73d508fba8: Pull complete Step #4: 465e42175aa3: Verifying Checksum Step #4: 465e42175aa3: Download complete Step #4: 13a1399396a7: Verifying Checksum Step #4: 13a1399396a7: Download complete Step #4: 5256a36340c7: Verifying Checksum Step #4: 5256a36340c7: Download complete Step #4: 2cf450df525b: Verifying Checksum Step #4: 2cf450df525b: Download complete Step #4: e491ffded19a: Verifying Checksum Step #4: e491ffded19a: Download complete Step #4: 0b512f445b6d: Verifying Checksum Step #4: 0b512f445b6d: Download complete Step #4: 076d4d0c30b1: Pull complete Step #4: e9a0aa9dd6dc: Verifying Checksum Step #4: e9a0aa9dd6dc: Download complete Step #4: f235e0212358: Verifying Checksum Step #4: f235e0212358: Download complete Step #4: 1763470f3f22: Pull complete Step #4: 0cdaacbae252: Verifying Checksum Step #4: 0cdaacbae252: Download complete Step #4: 88fe58210e04: Pull complete Step #4: 36c8153c465a: Verifying Checksum Step #4: 36c8153c465a: Download complete Step #4: 70d46b3445a4: Verifying Checksum Step #4: 70d46b3445a4: Download complete Step #4: a2d0fdcf2123: Pull complete Step #4: 13a1399396a7: Pull complete Step #4: 0f69f8b7d97d: Pull complete Step #4: 46813ec47842: Pull complete Step #4: 6860115fd42a: Pull complete Step #4: 5256a36340c7: Pull complete Step #4: 465e42175aa3: Pull complete Step #4: 70d46b3445a4: Pull complete Step #4: 2cf450df525b: Pull complete Step #4: e491ffded19a: Pull complete Step #4: 0b512f445b6d: Pull complete Step #4: e9a0aa9dd6dc: Pull complete Step #4: f235e0212358: Pull complete Step #4: 0cdaacbae252: Pull complete Step #4: 36c8153c465a: Pull complete Step #4: Digest: sha256:8a72aa1d5aca33da78cb3d3358c751907a98e497b6fc228853bb1a3867714c50 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #7: Running utxo_snapshot Step #7: Running addr_info_deserialize Step #7: Running blockfilter Step #7: Running pow_transition Step #7: Running versionbits Step #7: Running psbt Step #7: Running rolling_bloom_filter Step #7: Running bip324_cipher_roundtrip Step #7: [2025-01-24 06:34:31,752 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:31,752 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:31,752 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:31,766 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:31,766 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:31,766 INFO] Finished finding shared libraries for targets. Step #7: Running coin_grinder_is_optimal Step #7: Running bitdeque Step #7: Running wallet_fees Step #7: [2025-01-24 06:34:33,616 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:33,625 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:34,007 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:34,016 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:34,027 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:34,036 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:35,803 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:35,812 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:36,230 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:36,238 INFO] Finished finding shared libraries for targets. Step #7: Running crypto_chacha20 Step #7: Running script_flags Step #7: Running txoutcompressor_deserialize Step #7: [2025-01-24 06:34:38,436 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:38,445 INFO] Finished finding shared libraries for targets. Step #7: Running crypto Step #7: [2025-01-24 06:34:39,277 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:39,286 INFO] Finished finding shared libraries for targets. Step #7: Running rbf Step #7: [2025-01-24 06:34:39,460 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:39,469 INFO] Finished finding shared libraries for targets. Step #7: Running message Step #7: Running miniscript_smart Step #7: Running flatfile Step #7: Running clusterlin_depgraph_sim Step #7: Running txdownloadman_impl Step #7: [2025-01-24 06:34:41,739 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:41,748 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:42,037 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:42,046 INFO] Finished finding shared libraries for targets. Step #7: Running feefrac Step #7: [2025-01-24 06:34:43,009 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:43,018 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:43,170 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:43,180 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:43,207 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:43,216 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:43,846 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:43,854 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:44,159 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:44,168 INFO] Finished finding shared libraries for targets. Step #7: Running ephemeral_package_eval Step #7: Running data_stream_addr_man Step #7: [2025-01-24 06:34:47,178 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:47,186 INFO] Finished finding shared libraries for targets. Step #7: Running wallet_create_transaction Step #7: Running crypto_poly1305_split Step #7: Running inv_deserialize Step #7: Running p2p_transport_bidirectional_v1v2 Step #7: Running node_eviction Step #7: [2025-01-24 06:34:49,231 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:49,239 INFO] Finished finding shared libraries for targets. Step #7: Running signature_checker Step #7: [2025-01-24 06:34:50,449 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:50,458 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:50,551 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:50,559 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:51,127 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:51,137 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:52,418 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:52,427 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:52,782 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:52,790 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:53,119 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:53,128 INFO] Finished finding shared libraries for targets. Step #7: Running multiplication_overflow Step #7: Running decode_tx Step #7: Running timeoffsets Step #7: [2025-01-24 06:34:55,356 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:55,365 INFO] Finished finding shared libraries for targets. Step #7: Running coinscache_sim Step #7: Running flat_file_pos_deserialize Step #7: Running block_deserialize Step #7: Running package_rbf Step #7: [2025-01-24 06:34:57,170 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:57,180 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:57,263 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:57,273 INFO] Finished finding shared libraries for targets. Step #7: Running snapshotmetadata_deserialize Step #7: [2025-01-24 06:34:58,458 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:58,467 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:34:59,406 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:34:59,416 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:00,048 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:00,057 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:01,400 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:01,408 INFO] Finished finding shared libraries for targets. Step #7: Running string Step #7: Running p2p_headers_presync Step #7: Running bitset Step #7: [2025-01-24 06:35:03,208 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:03,217 INFO] Finished finding shared libraries for targets. Step #7: Running coincontrol Step #7: Running primitives_transaction Step #7: Running pow Step #7: [2025-01-24 06:35:06,167 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:06,176 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:07,442 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:07,451 INFO] Finished finding shared libraries for targets. Step #7: Running partially_downloaded_block Step #7: Running crypter Step #7: Running bloom_filter Step #7: [2025-01-24 06:35:10,756 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:10,764 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:13,015 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:13,025 INFO] Finished finding shared libraries for targets. Step #7: Running scriptpubkeyman Step #7: [2025-01-24 06:35:14,975 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:14,984 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:17,541 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:17,550 INFO] Finished finding shared libraries for targets. Step #7: Running torcontrol Step #7: Running str_printf Step #7: Running key_io Step #7: [2025-01-24 06:35:19,765 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:19,775 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:20,414 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:20,422 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:20,984 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:20,994 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:21,006 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:21,015 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:22,116 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:22,125 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:24,069 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:24,078 INFO] Finished finding shared libraries for targets. Step #7: Running process_messages Step #7: Running signet Step #7: Running script_parsing Step #7: Running minisketch Step #7: Running addrman Step #7: [2025-01-24 06:35:26,112 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:26,121 INFO] Finished finding shared libraries for targets. Step #7: Running key_origin_info_deserialize Step #7: [2025-01-24 06:35:28,314 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:28,323 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:29,027 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:29,036 INFO] Finished finding shared libraries for targets. Step #7: Running secp256k1_ecdsa_signature_parse_der_lax Step #7: Running uint256_deserialize Step #7: Running chain Step #7: [2025-01-24 06:35:32,448 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:32,458 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:32,476 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:32,486 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:33,715 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:33,724 INFO] Finished finding shared libraries for targets. Step #7: Running crypto_common Step #7: [2025-01-24 06:35:36,645 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:36,654 INFO] Finished finding shared libraries for targets. Step #7: Running coins_view Step #7: Running mocked_descriptor_parse Step #7: [2025-01-24 06:35:37,559 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:37,568 INFO] Finished finding shared libraries for targets. Step #7: Running integer Step #7: Running addrman_serdeser Step #7: [2025-01-24 06:35:42,630 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:42,640 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:43,907 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:43,916 INFO] Finished finding shared libraries for targets. Step #7: Running checkqueue Step #7: [2025-01-24 06:35:47,234 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:47,244 INFO] Finished finding shared libraries for targets. Step #7: Running blocktransactionsrequest_deserialize Step #7: [2025-01-24 06:35:47,335 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:47,342 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:48,064 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:48,073 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:48,523 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:48,532 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:48,805 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:48,814 INFO] Finished finding shared libraries for targets. Step #7: Running protocol Step #7: Running coin_grinder Step #7: Running diskblockindex_deserialize Step #7: [2025-01-24 06:35:52,968 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:52,978 INFO] Finished finding shared libraries for targets. Step #7: Running kitchen_sink Step #7: Running netaddress Step #7: [2025-01-24 06:35:53,975 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:53,983 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:55,037 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:55,047 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:35:56,522 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:56,531 INFO] Finished finding shared libraries for targets. Step #7: Running clusterlin_postlinearize_tree Step #7: Running pub_key_deserialize Step #7: Running http_request Step #7: Running script_interpreter Step #7: [2025-01-24 06:35:59,510 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:35:59,518 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:00,507 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:00,517 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:00,748 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:00,756 INFO] Finished finding shared libraries for targets. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_new'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_invoke_callbacks_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_decref_and_unlock_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_free'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_get_length'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_drain'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_remove'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_copyout_from'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_pullup'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_search_eol'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_readln'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'evbuffer_add'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:evbuffer_chain_free'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:evbuffer_remove_all_callbacks'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:HAS_PINNED_R'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:ZERO_CHAIN'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:evbuffer_chain_new'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:evbuffer_strchr'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:evbuffer_getchr'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:evbuffer_chain_insert'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: Could not read coverage for 'buffer.c:evbuffer_ptr_subtract'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/event.c: No such file or directory Step #7: warning: Could not read coverage for 'event_mm_malloc_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/event.c: No such file or directory Step #7: warning: Could not read coverage for 'event_mm_calloc_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/event.c: No such file or directory Step #7: warning: Could not read coverage for 'event_mm_strdup_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/event.c: No such file or directory Step #7: warning: Could not read coverage for 'event_mm_realloc_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/event.c: No such file or directory Step #7: warning: Could not read coverage for 'event_mm_free_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'evutil_inet_pton'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'EVUTIL_ISALPHA_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'EVUTIL_ISALNUM_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'EVUTIL_ISDIGIT_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'EVUTIL_ISXDIGIT_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'EVUTIL_TOLOWER_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'evutil_ascii_strcasecmp'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: Could not read coverage for 'evutil_rtrim_lws_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_find_header'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_clear_headers'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_add_header'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_parse_firstline_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_parse_headers_'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_new'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_free'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_get_connection'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_get_uri'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_get_command'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_get_input_headers'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_get_output_headers'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_request_get_input_buffer'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_uri_parse_with_flags'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_uri_free'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_uri_get_scheme'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'evhttp_uri_get_host'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:evhttp_header_is_valid_value'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:evhttp_add_header_internal'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:evhttp_parse_request_line'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:evhttp_parse_http_version'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:evhttp_uri_parse_authority'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:evhttp_append_to_last_header'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:scheme_ok'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:end_of_authority'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:parse_authority'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:parse_port'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:end_of_path'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:path_matches_noscheme'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:userinfo_ok'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:bracket_addr_ok'. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: Could not read coverage for 'http.c:regname_ok'. Step #7: Running buffered_file Step #7: [2025-01-24 06:36:04,087 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:04,097 INFO] Finished finding shared libraries for targets. Step #7: Running process_message Step #7: Running validation_load_mempool Step #7: [2025-01-24 06:36:08,624 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:08,633 INFO] Finished finding shared libraries for targets. Step #7: Running miniscript_script Step #7: Running clusterlin_postlinearize_moved_leaf Step #7: [2025-01-24 06:36:14,766 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:14,774 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:14,777 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:14,786 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:15,301 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:15,310 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:15,862 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:15,871 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:16,264 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:16,272 INFO] Finished finding shared libraries for targets. Step #7: Running system Step #7: Running coins_deserialize Step #7: Running wallet_bdb_parser Step #7: [2025-01-24 06:36:19,637 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:19,645 INFO] Finished finding shared libraries for targets. Step #7: Running miniscript_string Step #7: Running script_ops Step #7: [2025-01-24 06:36:20,428 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:20,438 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:20,576 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:20,586 INFO] Finished finding shared libraries for targets. Step #7: Running partially_signed_transaction_deserialize Step #7: Running connman Step #7: Running utxo_snapshot_invalid Step #7: [2025-01-24 06:36:30,290 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:30,302 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:31,894 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:31,907 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:32,959 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:32,973 INFO] Finished finding shared libraries for targets. Step #7: Running crypto_aes256 Step #7: [2025-01-24 06:36:35,564 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:35,574 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:36,022 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:36,032 INFO] Finished finding shared libraries for targets. Step #7: Running fee_rate Step #7: [2025-01-24 06:36:38,728 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:38,738 INFO] Finished finding shared libraries for targets. Step #7: Running parse_hd_keypath Step #7: Running float Step #7: [2025-01-24 06:36:39,680 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:39,690 INFO] Finished finding shared libraries for targets. Step #7: Running net Step #7: [2025-01-24 06:36:40,675 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:40,684 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:40,799 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:40,809 INFO] Finished finding shared libraries for targets. Step #7: Running psbt_input_deserialize Step #7: [2025-01-24 06:36:44,629 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:44,638 INFO] Finished finding shared libraries for targets. Step #7: Running locale Step #7: Running mini_miner Step #7: Running miniscript_stable Step #7: [2025-01-24 06:36:46,295 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:46,304 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:48,313 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:48,322 INFO] Finished finding shared libraries for targets. Step #7: Running txrequest Step #7: Running rpc Step #7: Running crypto_aes256cbc Step #7: [2025-01-24 06:36:53,509 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:53,518 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:54,708 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:54,716 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:54,889 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:54,898 INFO] Finished finding shared libraries for targets. Step #7: Running block_header_and_short_txids_deserialize Step #7: [2025-01-24 06:36:57,253 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:57,262 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:36:58,755 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:36:58,763 INFO] Finished finding shared libraries for targets. Step #7: Running p2p_handshake Step #7: [2025-01-24 06:37:00,459 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:00,466 INFO] Finished finding shared libraries for targets. Step #7: Running bloomfilter_deserialize Step #7: Running script_descriptor_cache Step #7: Running blockundo_deserialize Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/log.c: No such file or directory Step #7: warning: Could not read coverage for 'event_enable_debug_logging'. Step #7: [2025-01-24 06:37:02,972 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:02,981 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:03,106 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:03,115 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:05,168 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:05,177 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:05,400 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:05,408 INFO] Finished finding shared libraries for targets. Step #7: Running parse_numbers Step #7: Running scriptnum_ops Step #7: Running vecdeque Step #7: Running fee_rate_deserialize Step #7: Running crypto_hkdf_hmac_sha256_l32 Step #7: [2025-01-24 06:37:08,668 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:08,675 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:08,908 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:08,917 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:09,305 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:09,314 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:09,976 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:09,984 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:11,241 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:11,250 INFO] Finished finding shared libraries for targets. Step #7: Running load_external_block_file Step #7: Running banman Step #7: Running tx_pool_standard Step #7: Running headers_sync_state Step #7: Running bip324_ecdh Step #7: [2025-01-24 06:37:16,696 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:16,706 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:17,082 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:17,092 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:17,277 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:17,286 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:18,753 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:18,764 INFO] Finished finding shared libraries for targets. Step #7: Running mini_miner_selection Step #7: Running blockheader_deserialize Step #7: Running tx_in Step #7: [2025-01-24 06:37:20,422 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:20,432 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:20,763 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:20,773 INFO] Finished finding shared libraries for targets. Step #7: Running script_sigcache Step #7: Running p2p_transport_serialization Step #7: Running clusterlin_chunking Step #7: [2025-01-24 06:37:26,600 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:26,609 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:26,841 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:26,850 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:27,675 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:27,684 INFO] Finished finding shared libraries for targets. Step #7: Running eval_script Step #7: Running clusterlin_make_connected Step #7: Running out_point_deserialize Step #7: [2025-01-24 06:37:31,612 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:31,622 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:31,668 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:31,677 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:31,856 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:31,865 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:33,213 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:33,222 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:33,356 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:33,364 INFO] Finished finding shared libraries for targets. Step #7: Running pool_resource Step #7: Running transaction Step #7: Running script_sign Step #7: Running block_index Step #7: Running uint160_deserialize Step #7: [2025-01-24 06:37:37,847 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:37,856 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:40,342 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:40,352 INFO] Finished finding shared libraries for targets. Step #7: Running golomb_rice Step #7: [2025-01-24 06:37:42,678 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:42,687 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:43,182 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:43,191 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:44,088 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:44,095 INFO] Finished finding shared libraries for targets. Step #7: Running script_deserialize Step #7: Running chacha20_split_crypt Step #7: Running hex Step #7: Running clusterlin_components Step #7: [2025-01-24 06:37:47,236 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:47,245 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:48,443 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:48,451 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:48,730 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:48,739 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:49,095 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:49,104 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:51,011 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:51,020 INFO] Finished finding shared libraries for targets. Step #7: Running service_deserialize Step #7: Running cuckoocache Step #7: Running parse_iso8601 Step #7: Running script Step #7: Running partial_merkle_tree_deserialize Step #7: [2025-01-24 06:37:53,674 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:53,683 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:53,921 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:53,929 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:56,161 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:56,170 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:37:57,053 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:57,061 INFO] Finished finding shared libraries for targets. Step #7: Running blocklocator_deserialize Step #7: Running netaddr_deserialize Step #7: Running random Step #7: Running block Step #7: [2025-01-24 06:37:59,461 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:37:59,472 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:00,290 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:00,298 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:00,423 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:00,433 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:02,194 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:02,204 INFO] Finished finding shared libraries for targets. Step #7: Running utxo_total_supply Step #7: Running autofile Step #7: Running block_filter_deserialize Step #7: Running local_address Step #7: [2025-01-24 06:38:06,644 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:06,653 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:07,018 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:07,027 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:07,037 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:07,046 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:09,214 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:09,223 INFO] Finished finding shared libraries for targets. Step #7: Running net_permissions Step #7: Running clusterlin_postlinearize Step #7: [2025-01-24 06:38:10,350 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:10,359 INFO] Finished finding shared libraries for targets. Step #7: Running addition_overflow Step #7: Running overflow Step #7: [2025-01-24 06:38:11,707 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:11,715 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:11,776 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:11,785 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:12,924 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:12,934 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:13,024 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:13,033 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:13,147 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:13,156 INFO] Finished finding shared libraries for targets. Step #7: Running merkleblock Step #7: Running crypto_poly1305 Step #7: Running wallet_notifications Step #7: Running i2p Step #7: Running block_file_info_deserialize Step #7: [2025-01-24 06:38:17,946 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:17,955 INFO] Finished finding shared libraries for targets. Step #7: Running key Step #7: [2025-01-24 06:38:19,120 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:19,129 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:21,153 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:21,162 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:21,594 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:21,603 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:22,430 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:22,439 INFO] Finished finding shared libraries for targets. Step #7: Running clusterlin_ancestor_finder Step #7: Running clusterlin_depgraph_serialization Step #7: Running prevector Step #7: Running txorphan Step #7: [2025-01-24 06:38:24,012 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:24,022 INFO] Finished finding shared libraries for targets. Step #7: Running fees Step #7: [2025-01-24 06:38:24,801 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:24,811 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:25,871 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:25,880 INFO] Finished finding shared libraries for targets. Step #7: Running messageheader_deserialize Step #7: [2025-01-24 06:38:29,299 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:29,309 INFO] Finished finding shared libraries for targets. Step #7: Running blockmerkleroot Step #7: Running parse_script Step #7: [2025-01-24 06:38:30,146 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:30,155 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:33,419 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:33,428 INFO] Finished finding shared libraries for targets. Step #7: Running clusterlin_search_finder Step #7: Running span Step #7: [2025-01-24 06:38:35,285 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:35,295 INFO] Finished finding shared libraries for targets. Step #7: Running ellswift_roundtrip Step #7: [2025-01-24 06:38:36,028 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:36,039 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:38,716 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:38,724 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:39,783 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:39,793 INFO] Finished finding shared libraries for targets. Step #7: Running clusterlin_linearization_chunking Step #7: Running secp256k1_ec_seckey_import_export_der Step #7: Running merkle_block_deserialize Step #7: [2025-01-24 06:38:41,779 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:41,789 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:42,475 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:42,484 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:43,634 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:43,643 INFO] Finished finding shared libraries for targets. Step #7: Running crypto_fschacha20poly1305 Step #7: Running socks5 Step #7: [2025-01-24 06:38:46,320 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:46,330 INFO] Finished finding shared libraries for targets. Step #7: Running bech32 Step #7: Running crypto_fschacha20 Step #7: [2025-01-24 06:38:47,102 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:47,112 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:47,622 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:47,631 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:48,393 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:48,403 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:48,666 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:48,675 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:48,727 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:48,735 INFO] Finished finding shared libraries for targets. Step #7: Running crypto_aeadchacha20poly1305 Step #7: Running psbt_output_deserialize Step #7: Running policy_estimator Step #7: Running address_deserialize Step #7: [2025-01-24 06:38:53,184 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:53,194 INFO] Finished finding shared libraries for targets. Step #7: Running prefilled_transaction_deserialize Step #7: Running parse_univalue Step #7: [2025-01-24 06:38:55,140 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:55,150 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:56,530 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:56,539 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:38:57,064 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:57,073 INFO] Finished finding shared libraries for targets. Step #7: Running clusterlin_linearize Step #7: Running block_header Step #7: [2025-01-24 06:38:58,966 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:38:58,975 INFO] Finished finding shared libraries for targets. Step #7: Running chacha20_split_keystream Step #7: Running build_and_compare_feerate_diagram Step #7: [2025-01-24 06:39:00,736 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:00,746 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:01,041 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:01,049 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:01,604 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:01,612 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:02,044 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:02,053 INFO] Finished finding shared libraries for targets. Step #7: Running asmap Step #7: Running base_encode_decode Step #7: Running tx_in_deserialize Step #7: Running blocktransactions_deserialize Step #7: [2025-01-24 06:39:05,642 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:05,652 INFO] Finished finding shared libraries for targets. Step #7: Running p2p_transport_bidirectional Step #7: [2025-01-24 06:39:06,818 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:06,827 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:08,570 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:08,579 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:08,913 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:08,923 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:09,595 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:09,604 INFO] Finished finding shared libraries for targets. Step #7: Running txundo_deserialize Step #7: [2025-01-24 06:39:10,898 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:10,908 INFO] Finished finding shared libraries for targets. Step #7: Running policy_estimator_io Step #7: [2025-01-24 06:39:11,095 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:11,105 INFO] Finished finding shared libraries for targets. Step #7: Running asmap_direct Step #7: Running tx_out Step #7: Running descriptor_parse Step #7: Running script_format Step #7: Running tx_pool Step #7: [2025-01-24 06:39:13,482 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:13,492 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:14,127 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:14,137 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:14,272 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:14,281 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:14,394 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:14,403 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:14,458 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:14,467 INFO] Finished finding shared libraries for targets. Step #7: Running coinselection Step #7: Running clusterlin_merge Step #7: Running muhash Step #7: Running netbase_dns_lookup Step #7: Running txdownloadman Step #7: [2025-01-24 06:39:20,246 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:20,255 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:21,785 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:21,795 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:22,274 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:22,284 INFO] Finished finding shared libraries for targets. Step #7: Running tx_package_eval Step #7: Running p2p_transport_bidirectional_v2 Step #7: Running crypto_diff_fuzz_chacha20 Step #7: [2025-01-24 06:39:26,999 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:27,009 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:33,575 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:33,584 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:34,148 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:34,159 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:39:35,082 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:39:35,092 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:40:29,576 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:40:29,585 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:40:29,917 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:40:29,926 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:41:01,749 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:41:01,763 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:41:41,456 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:41:41,465 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:42:21,958 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:42:21,968 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:42:59,481 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:42:59,490 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:46:31,230 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:46:31,239 INFO] Finished finding shared libraries for targets. Step #7: [2025-01-24 06:46:34,015 INFO] Finding shared libraries for targets (if any). Step #7: [2025-01-24 06:46:35,360 INFO] Finished finding shared libraries for targets. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/arc4random.c: No such file or directory Step #7: warning: The file '/usr/arc4random.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/changelist-internal.h: No such file or directory Step #7: warning: The file '/usr/changelist-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/compat/sys/queue.h: No such file or directory Step #7: warning: The file '/usr/compat/sys/queue.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/epoll.c: No such file or directory Step #7: warning: The file '/usr/epoll.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/epolltable-internal.h: No such file or directory Step #7: warning: The file '/usr/epolltable-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evbuffer-internal.h: No such file or directory Step #7: warning: The file '/usr/evbuffer-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/event-internal.h: No such file or directory Step #7: warning: The file '/usr/event-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/event.c: No such file or directory Step #7: warning: The file '/usr/event.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evmap.c: No such file or directory Step #7: warning: The file '/usr/evmap.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evthread.c: No such file or directory Step #7: warning: The file '/usr/evthread.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evthread_pthread.c: No such file or directory Step #7: warning: The file '/usr/evthread_pthread.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil.c: No such file or directory Step #7: warning: The file '/usr/evutil.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil_rand.c: No such file or directory Step #7: warning: The file '/usr/evutil_rand.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evutil_time.c: No such file or directory Step #7: warning: The file '/usr/evutil_time.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/ht-internal.h: No such file or directory Step #7: warning: The file '/usr/ht-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http-internal.h: No such file or directory Step #7: warning: The file '/usr/http-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/http.c: No such file or directory Step #7: warning: The file '/usr/http.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/bufferevent.h: No such file or directory Step #7: warning: The file '/usr/include/event2/bufferevent.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/event.h: No such file or directory Step #7: warning: The file '/usr/include/event2/event.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/event_struct.h: No such file or directory Step #7: warning: The file '/usr/include/event2/event_struct.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/http.h: No such file or directory Step #7: warning: The file '/usr/include/event2/http.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/http_struct.h: No such file or directory Step #7: warning: The file '/usr/include/event2/http_struct.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/listener.h: No such file or directory Step #7: warning: The file '/usr/include/event2/listener.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/thread.h: No such file or directory Step #7: warning: The file '/usr/include/event2/thread.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/util.h: No such file or directory Step #7: warning: The file '/usr/include/event2/util.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/listener.c: No such file or directory Step #7: warning: The file '/usr/listener.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/log-internal.h: No such file or directory Step #7: warning: The file '/usr/log-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/minheap-internal.h: No such file or directory Step #7: warning: The file '/usr/minheap-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/mm-internal.h: No such file or directory Step #7: warning: The file '/usr/mm-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/poll.c: No such file or directory Step #7: warning: The file '/usr/poll.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/select.c: No such file or directory Step #7: warning: The file '/usr/select.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/signal.c: No such file or directory Step #7: warning: The file '/usr/signal.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/strlcpy-internal.h: No such file or directory Step #7: warning: The file '/usr/strlcpy-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/strlcpy.c: No such file or directory Step #7: warning: The file '/usr/strlcpy.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/util-internal.h: No such file or directory Step #7: warning: The file '/usr/util-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/build/include/event2/event-config.h: No such file or directory Step #7: warning: The file '/usr/build/include/event2/event-config.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/include/event2/buffer.h: No such file or directory Step #7: warning: The file '/usr/include/event2/buffer.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/log.c: No such file or directory Step #7: warning: The file '/usr/log.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/evthread-internal.h: No such file or directory Step #7: warning: The file '/usr/evthread-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/buffer.c: No such file or directory Step #7: warning: The file '/usr/buffer.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/bufferevent-internal.h: No such file or directory Step #7: warning: The file '/usr/bufferevent-internal.h' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/bufferevent.c: No such file or directory Step #7: warning: The file '/usr/bufferevent.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/bufferevent_filter.c: No such file or directory Step #7: warning: The file '/usr/bufferevent_filter.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/bufferevent_pair.c: No such file or directory Step #7: warning: The file '/usr/bufferevent_pair.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/bufferevent_ratelim.c: No such file or directory Step #7: warning: The file '/usr/bufferevent_ratelim.c' isn't covered. Step #7: error: /workspace/out/libfuzzer-coverage-x86_64/usr/bufferevent_sock.c: No such file or directory Step #7: warning: The file '/usr/bufferevent_sock.c' isn't covered. Step #7: [2025-01-24 06:49:41,995 DEBUG] Finished generating per-file code coverage summary. Step #7: [2025-01-24 06:49:41,995 DEBUG] Generating file view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report/linux/file_view_index.html". Step #7: Traceback (most recent call last): Step #7: File "/opt/code_coverage/coverage_utils.py", line 829, in Step #7: sys.exit(Main()) Step #7: File "/opt/code_coverage/coverage_utils.py", line 823, in Main Step #7: return _CmdPostProcess(args) Step #7: File "/opt/code_coverage/coverage_utils.py", line 780, in _CmdPostProcess Step #7: processor.PrepareHtmlReport() Step #7: File "/opt/code_coverage/coverage_utils.py", line 577, in PrepareHtmlReport Step #7: self.GenerateFileViewHtmlIndexFile(per_file_coverage_summary, Step #7: File "/opt/code_coverage/coverage_utils.py", line 450, in GenerateFileViewHtmlIndexFile Step #7: self.GetCoverageHtmlReportPathForFile(file_path), Step #7: File "/opt/code_coverage/coverage_utils.py", line 422, in GetCoverageHtmlReportPathForFile Step #7: assert os.path.isfile( Step #7: AssertionError: "/usr/arc4random.c" is not a file. Step #7: ******************************************************************************** Step #7: Code coverage report generation failed. Step #7: To reproduce, run: Step #7: python infra/helper.py build_image bitcoin-core Step #7: python infra/helper.py build_fuzzers --sanitizer coverage bitcoin-core Step #7: python infra/helper.py coverage bitcoin-core Step #7: ******************************************************************************** Finished Step #7 ERROR ERROR: build step 7 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1