starting build "369ad4dc-3a39-4ecc-8063-0dba633e6cf3" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 5fc1849ea29a: Pulling fs layer Step #1: 5bca3ba2fc7d: Pulling fs layer Step #1: c3f8f264f82b: Pulling fs layer Step #1: 4beb7a10c8f4: Pulling fs layer Step #1: 0ca13ee436c2: Pulling fs layer Step #1: d11b53fc85fe: Pulling fs layer Step #1: 1cbdd3829a23: Pulling fs layer Step #1: 7f7781280c06: Pulling fs layer Step #1: 846994f6541d: Pulling fs layer Step #1: 83087fdbd323: Pulling fs layer Step #1: 5e20af423505: Pulling fs layer Step #1: 7e2d2d2efe99: Pulling fs layer Step #1: c3f8f264f82b: Waiting Step #1: bae98e0cfe62: Pulling fs layer Step #1: 4beb7a10c8f4: Waiting Step #1: 7c94181fc29a: Pulling fs layer Step #1: 4018e9ce42a6: Pulling fs layer Step #1: bf9219ec845b: Pulling fs layer Step #1: 71174894d930: Pulling fs layer Step #1: e04ddd5d972b: Pulling fs layer Step #1: bfb7b1a6728d: Pulling fs layer Step #1: 2e1d8e23a9a8: Pulling fs layer Step #1: 0ca13ee436c2: Waiting Step #1: 153eacb0a891: Pulling fs layer Step #1: 4d7aa988bb31: Pulling fs layer Step #1: f93820478c87: Pulling fs layer Step #1: 038020a237ce: Pulling fs layer Step #1: d11b53fc85fe: Waiting Step #1: 416ea49f7c22: Pulling fs layer Step #1: 9cdc40c52e67: Pulling fs layer Step #1: bee113eb3842: Pulling fs layer Step #1: 93286fa4d809: Pulling fs layer Step #1: 88a7cbc5ce33: Pulling fs layer Step #1: 5bdd6bc53e7b: Pulling fs layer Step #1: d84cd2be715d: Pulling fs layer Step #1: d171e73dd44a: Pulling fs layer Step #1: 71174894d930: Waiting Step #1: bae98e0cfe62: Waiting Step #1: 9972794eff61: Pulling fs layer Step #1: 88a7cbc5ce33: Waiting Step #1: 7c94181fc29a: Waiting Step #1: 7f7781280c06: Waiting Step #1: 153eacb0a891: Waiting Step #1: 846994f6541d: Waiting Step #1: 83087fdbd323: Waiting Step #1: bfb7b1a6728d: Waiting Step #1: 5e20af423505: Waiting Step #1: 038020a237ce: Waiting Step #1: f93820478c87: Waiting Step #1: d84cd2be715d: Waiting Step #1: 9cdc40c52e67: Waiting Step #1: bee113eb3842: Waiting Step #1: e04ddd5d972b: Waiting Step #1: 1cbdd3829a23: Waiting Step #1: 2e1d8e23a9a8: Waiting Step #1: bf9219ec845b: Waiting Step #1: 5bdd6bc53e7b: Waiting Step #1: 4d7aa988bb31: Waiting Step #1: d171e73dd44a: Waiting Step #1: 9972794eff61: Waiting Step #1: 5bca3ba2fc7d: Verifying Checksum Step #1: 5bca3ba2fc7d: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 4beb7a10c8f4: Download complete Step #1: c3f8f264f82b: Verifying Checksum Step #1: c3f8f264f82b: Download complete Step #1: 0ca13ee436c2: Verifying Checksum Step #1: 0ca13ee436c2: Download complete Step #1: 1cbdd3829a23: Verifying Checksum Step #1: 1cbdd3829a23: Download complete Step #1: 5fc1849ea29a: Verifying Checksum Step #1: 5fc1849ea29a: Download complete Step #1: 7f7781280c06: Verifying Checksum Step #1: 7f7781280c06: Download complete Step #1: b549f31133a9: Pull complete Step #1: 83087fdbd323: Verifying Checksum Step #1: 83087fdbd323: Download complete Step #1: 5e20af423505: Verifying Checksum Step #1: 5e20af423505: Download complete Step #1: 7e2d2d2efe99: Verifying Checksum Step #1: 7e2d2d2efe99: Download complete Step #1: bae98e0cfe62: Verifying Checksum Step #1: bae98e0cfe62: Download complete Step #1: 7c94181fc29a: Verifying Checksum Step #1: 7c94181fc29a: Download complete Step #1: 4018e9ce42a6: Verifying Checksum Step #1: 4018e9ce42a6: Download complete Step #1: 846994f6541d: Verifying Checksum Step #1: 846994f6541d: Download complete Step #1: 71174894d930: Verifying Checksum Step #1: 71174894d930: Download complete Step #1: bf9219ec845b: Verifying Checksum Step #1: bf9219ec845b: Download complete Step #1: bfb7b1a6728d: Verifying Checksum Step #1: bfb7b1a6728d: Download complete Step #1: e04ddd5d972b: Verifying Checksum Step #1: e04ddd5d972b: Download complete Step #1: 2e1d8e23a9a8: Verifying Checksum Step #1: 2e1d8e23a9a8: Download complete Step #1: 153eacb0a891: Verifying Checksum Step #1: 153eacb0a891: Download complete Step #1: f93820478c87: Download complete Step #1: d11b53fc85fe: Verifying Checksum Step #1: d11b53fc85fe: Download complete Step #1: 4d7aa988bb31: Verifying Checksum Step #1: 4d7aa988bb31: Download complete Step #1: 038020a237ce: Verifying Checksum Step #1: 038020a237ce: Download complete Step #1: 416ea49f7c22: Verifying Checksum Step #1: 416ea49f7c22: Download complete Step #1: 9cdc40c52e67: Verifying Checksum Step #1: 9cdc40c52e67: Download complete Step #1: bee113eb3842: Verifying Checksum Step #1: bee113eb3842: Download complete Step #1: 93286fa4d809: Verifying Checksum Step #1: 93286fa4d809: Download complete Step #1: 5bdd6bc53e7b: Verifying Checksum Step #1: 5bdd6bc53e7b: Download complete Step #1: 88a7cbc5ce33: Verifying Checksum Step #1: 88a7cbc5ce33: Download complete Step #1: d84cd2be715d: Verifying Checksum Step #1: d84cd2be715d: Download complete Step #1: 5fc1849ea29a: Pull complete Step #1: 9972794eff61: Verifying Checksum Step #1: 9972794eff61: Download complete Step #1: d171e73dd44a: Verifying Checksum Step #1: d171e73dd44a: Download complete Step #1: 5bca3ba2fc7d: Pull complete Step #1: c3f8f264f82b: Pull complete Step #1: 4beb7a10c8f4: Pull complete Step #1: 0ca13ee436c2: Pull complete Step #1: d11b53fc85fe: Pull complete Step #1: 1cbdd3829a23: Pull complete Step #1: 7f7781280c06: Pull complete Step #1: 846994f6541d: Pull complete Step #1: 83087fdbd323: Pull complete Step #1: 5e20af423505: Pull complete Step #1: 7e2d2d2efe99: Pull complete Step #1: bae98e0cfe62: Pull complete Step #1: 7c94181fc29a: Pull complete Step #1: 4018e9ce42a6: Pull complete Step #1: bf9219ec845b: Pull complete Step #1: 71174894d930: Pull complete Step #1: e04ddd5d972b: Pull complete Step #1: bfb7b1a6728d: Pull complete Step #1: 2e1d8e23a9a8: Pull complete Step #1: 153eacb0a891: Pull complete Step #1: 4d7aa988bb31: Pull complete Step #1: f93820478c87: Pull complete Step #1: 038020a237ce: Pull complete Step #1: 416ea49f7c22: Pull complete Step #1: 9cdc40c52e67: Pull complete Step #1: bee113eb3842: Pull complete Step #1: 93286fa4d809: Pull complete Step #1: 88a7cbc5ce33: Pull complete Step #1: 5bdd6bc53e7b: Pull complete Step #1: d84cd2be715d: Pull complete Step #1: d171e73dd44a: Pull complete Step #1: 9972794eff61: Pull complete Step #1: Digest: sha256:a2f870afb8e148c5cfc32450b790335c008e4a0c77e210bbb8adf0c60caae5c6 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> dd198c39e8a6 Step #1: Step 2/7 : RUN apt-get update && apt-get install -y make autoconf automake libtool bsdmainutils Step #1: ---> Running in f950ba358798 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:3 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (556 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev file libltdl-dev libltdl7 libmagic-mgc libmagic1 libsigsegv2 Step #1: m4 Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext wamerican | wordlist Step #1: whois vacation libtool-doc gfortran | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev bsdmainutils file libltdl-dev libltdl7 Step #1: libmagic-mgc libmagic1 libsigsegv2 libtool m4 Step #1: 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 1956 kB of archives. Step #1: After this operation, 13.5 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 bsdmainutils amd64 11.1.2ubuntu3 [181 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 1956 kB in 0s (5718 kB/s) Step #1: Selecting previously unselected package libmagic-mgc. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package bsdmainutils. Step #1: Preparing to unpack .../03-bsdmainutils_11.1.2ubuntu3_amd64.deb ... Step #1: Unpacking bsdmainutils (11.1.2ubuntu3) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../04-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../05-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../06-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../07-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../08-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../09-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../10-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../11-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up bsdmainutils (11.1.2ubuntu3) ... Step #1: update-alternatives: using /usr/bin/bsd-write to provide /usr/bin/write (write) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/write.1.gz because associated file /usr/share/man/man1/bsd-write.1.gz (of link group write) doesn't exist Step #1: update-alternatives: using /usr/bin/bsd-from to provide /usr/bin/from (from) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/from.1.gz because associated file /usr/share/man/man1/bsd-from.1.gz (of link group from) doesn't exist Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container f950ba358798 Step #1: ---> 687fa2d57dd0 Step #1: Step 3/7 : RUN git clone --depth 1 https://github.com/wolfSSL/wolfssl.git Step #1: ---> Running in 5f23365fa5d1 Step #1: Cloning into 'wolfssl'... Step #1: Removing intermediate container 5f23365fa5d1 Step #1: ---> 712497c11629 Step #1: Step 4/7 : RUN git clone --depth 1 https://github.com/wolfSSL/wolfMQTT.git wolfmqtt Step #1: ---> Running in 294e1827ba74 Step #1: Cloning into 'wolfmqtt'... Step #1: Removing intermediate container 294e1827ba74 Step #1: ---> 0d56c1c48d91 Step #1: Step 5/7 : RUN git clone --depth 1 https://github.com/guidovranken/wolfmqtt-fuzzers.git Step #1: ---> Running in e26f4780a712 Step #1: Cloning into 'wolfmqtt-fuzzers'... Step #1: Removing intermediate container e26f4780a712 Step #1: ---> c5ac0ac4e6ae Step #1: Step 6/7 : RUN git clone --depth 1 https://github.com/guidovranken/fuzzing-headers.git Step #1: ---> Running in 5d9c1ea666f1 Step #1: Cloning into 'fuzzing-headers'... Step #1: Removing intermediate container 5d9c1ea666f1 Step #1: ---> f07e7f7813ce Step #1: Step 7/7 : COPY build.sh $SRC/ Step #1: ---> 3cc8ed38a071 Step #1: Successfully built 3cc8ed38a071 Step #1: Successfully tagged gcr.io/oss-fuzz/wolfmqtt:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/wolfmqtt Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileoUaFhP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/fuzzing-headers/.git Step #2 - "srcmap": + GIT_DIR=/src/fuzzing-headers Step #2 - "srcmap": + cd /src/fuzzing-headers Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/guidovranken/fuzzing-headers.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bbd75f2806d18009aeca0f3b8fdcc6e7a3929686 Step #2 - "srcmap": + jq_inplace /tmp/fileoUaFhP '."/src/fuzzing-headers" = { type: "git", url: "https://github.com/guidovranken/fuzzing-headers.git", rev: "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileIJUfO9 Step #2 - "srcmap": + cat /tmp/fileoUaFhP Step #2 - "srcmap": + jq '."/src/fuzzing-headers" = { type: "git", url: "https://github.com/guidovranken/fuzzing-headers.git", rev: "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" }' Step #2 - "srcmap": + mv /tmp/fileIJUfO9 /tmp/fileoUaFhP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/wolfmqtt-fuzzers/.git Step #2 - "srcmap": + GIT_DIR=/src/wolfmqtt-fuzzers Step #2 - "srcmap": + cd /src/wolfmqtt-fuzzers Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/guidovranken/wolfmqtt-fuzzers.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=280349b540f9d3a386035894b09487ced6104e92 Step #2 - "srcmap": + jq_inplace /tmp/fileoUaFhP '."/src/wolfmqtt-fuzzers" = { type: "git", url: "https://github.com/guidovranken/wolfmqtt-fuzzers.git", rev: "280349b540f9d3a386035894b09487ced6104e92" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileE9qT2G Step #2 - "srcmap": + cat /tmp/fileoUaFhP Step #2 - "srcmap": + jq '."/src/wolfmqtt-fuzzers" = { type: "git", url: "https://github.com/guidovranken/wolfmqtt-fuzzers.git", rev: "280349b540f9d3a386035894b09487ced6104e92" }' Step #2 - "srcmap": + mv /tmp/fileE9qT2G /tmp/fileoUaFhP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/wolfmqtt/.git Step #2 - "srcmap": + GIT_DIR=/src/wolfmqtt Step #2 - "srcmap": + cd /src/wolfmqtt Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/wolfSSL/wolfMQTT.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d5b9743c79f4fdec734d6e8167902b87847310ef Step #2 - "srcmap": + jq_inplace /tmp/fileoUaFhP '."/src/wolfmqtt" = { type: "git", url: "https://github.com/wolfSSL/wolfMQTT.git", rev: "d5b9743c79f4fdec734d6e8167902b87847310ef" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filerNbmAd Step #2 - "srcmap": + cat /tmp/fileoUaFhP Step #2 - "srcmap": + jq '."/src/wolfmqtt" = { type: "git", url: "https://github.com/wolfSSL/wolfMQTT.git", rev: "d5b9743c79f4fdec734d6e8167902b87847310ef" }' Step #2 - "srcmap": + mv /tmp/filerNbmAd /tmp/fileoUaFhP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/wolfssl/.git Step #2 - "srcmap": + GIT_DIR=/src/wolfssl Step #2 - "srcmap": + cd /src/wolfssl Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/wolfSSL/wolfssl.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=e76186f06080bff1ca0c6c9e07c02cfb38041e4c Step #2 - "srcmap": + jq_inplace /tmp/fileoUaFhP '."/src/wolfssl" = { type: "git", url: "https://github.com/wolfSSL/wolfssl.git", rev: "e76186f06080bff1ca0c6c9e07c02cfb38041e4c" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileq1Uu8N Step #2 - "srcmap": + cat /tmp/fileoUaFhP Step #2 - "srcmap": + jq '."/src/wolfssl" = { type: "git", url: "https://github.com/wolfSSL/wolfssl.git", rev: "e76186f06080bff1ca0c6c9e07c02cfb38041e4c" }' Step #2 - "srcmap": + mv /tmp/fileq1Uu8N /tmp/fileoUaFhP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileoUaFhP Step #2 - "srcmap": + rm /tmp/fileoUaFhP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/fuzzing-headers": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/guidovranken/fuzzing-headers.git", Step #2 - "srcmap": "rev": "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/wolfmqtt-fuzzers": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/guidovranken/wolfmqtt-fuzzers.git", Step #2 - "srcmap": "rev": "280349b540f9d3a386035894b09487ced6104e92" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/wolfmqtt": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/wolfSSL/wolfMQTT.git", Step #2 - "srcmap": "rev": "d5b9743c79f4fdec734d6e8167902b87847310ef" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/wolfssl": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/wolfSSL/wolfssl.git", Step #2 - "srcmap": "rev": "e76186f06080bff1ca0c6c9e07c02cfb38041e4c" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/wolfssl/ Step #3 - "compile-libfuzzer-coverage-x86_64": + autoreconf -ivf Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Entering directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: not using Gettext Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: aclocal --force -I m4 Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: tracing Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: creating directory build-aux Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: libtoolize --copy --force Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'build-aux/ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoconf --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoheader --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: automake --add-missing --copy --force-missing Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:25: installing 'build-aux/compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:27: installing 'build-aux/config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:27: installing 'build-aux/config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:31: installing 'build-aux/install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:31: installing 'build-aux/missing' Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile.am: installing 'build-aux/depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing 'build-aux/test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Leaving directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *sanitize=memory* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *-m32* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --enable-static --disable-crypttests --disable-examples Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to enable maintainer-specific portions of Makefiles... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking target system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether UID '0' is supported by ustar format... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether GID '0' is supported by ustar format... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to create a ustar tar archive... gnutar Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether -lc should be explicitly linked in... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the -Werror option is usable... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for simple visibility declarations... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long long... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of time_t... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for __uint128_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for arpa/inet.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fcntl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for limits.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netdb.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netinet/in.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netinet/in.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/in.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stddef.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stddef.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stddef.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking time.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking time.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioctl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioctl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/ioctl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/socket.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/socket.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/socket.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking errno.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking errno.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for errno.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/un.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/un.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/un.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for socket in -lnetwork... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether byte ordering is bigendian... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for __atomic... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdatomic.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stdatomic.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdatomic.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gethostbyname... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getaddrinfo... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gettimeofday... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gmtime_r... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gmtime_s... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inet_ntoa... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memset... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for socket... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strftime... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for atexit... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether gethostbyname is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether getaddrinfo is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether gettimeofday is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether gmtime_r is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether gmtime_s is declared... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether inet_ntoa is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether memset is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether socket is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether strftime is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether atexit is declared... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uint8_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for uintptr_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for thread local storage (TLS) class... _Thread_local Step #3 - "compile-libfuzzer-coverage-x86_64": checking for debug... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang is Clang... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether pthreads work with "-pthread" and "-lpthread"... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether Clang needs flag to prevent "argument unused" warning when linking with -pthread... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether more special flags are required for pthreads... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for PTHREAD_PRIO_INHERIT... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for cos in -lm... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing gethostbyname... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for library containing socket... none required Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vcs system... git Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vcs checkout... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the linker accepts -Werror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the linker accepts -z relro -z now... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the linker accepts -pie... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Werror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wno-pragmas... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wall... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wextra... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunknown-pragmas... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wthis-test-should-fail... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Waddress... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Warray-bounds... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wbad-function-cast... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wchar-subscripts... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wcomment... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wfloat-equal... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wformat-security... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wformat=2... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmaybe-uninitialized... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmissing-field-initializers... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmissing-noreturn... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmissing-prototypes... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wnested-externs... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wnormalized=id... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Woverride-init... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wpointer-arith... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wpointer-sign... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wshadow... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wshorten-64-to-32... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wsign-compare... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wstrict-overflow=1... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wstrict-prototypes... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wswitch-enum... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wundef... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunused... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunused-result... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunused-variable... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wwrite-strings... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -fwrapv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": creating wolfssl-config - generic 5.7.6 for -lwolfssl -lpthread Step #3 - "compile-libfuzzer-coverage-x86_64": checking the number of available CPUs... 32 Step #3 - "compile-libfuzzer-coverage-x86_64": configure: adding automake macro support Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating aminclude.am Step #3 - "compile-libfuzzer-coverage-x86_64": configure: added jobserver support to make for 33 jobs Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating stamp-h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating wolfssl/version.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating wolfssl/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating support/wolfssl.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating debian/control Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating debian/changelog Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating rpm/spec Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating wolfcrypt/test/test_paths.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating scripts/unit.test Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing wolfssl/wolfcrypt/async.h commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing wolfssl/wolfcrypt/fips.h commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing wolfssl/wolfcrypt/port/cavium/cavium_nitrox.h commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing wolfssl/wolfcrypt/port/intel/quickassist.h commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing wolfssl/wolfcrypt/port/intel/quickassist_mem.h commands Step #3 - "compile-libfuzzer-coverage-x86_64": configure: --- Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Running make clean... Step #3 - "compile-libfuzzer-coverage-x86_64": configure: --- Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Generating user options header... Step #3 - "compile-libfuzzer-coverage-x86_64": --- Step #3 - "compile-libfuzzer-coverage-x86_64": Configuration summary for wolfssl version 5.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": * Installation prefix: /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": * System type: pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": * Host CPU: x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": * C Compiler: clang Step #3 - "compile-libfuzzer-coverage-x86_64": * C Flags: -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -Werror -Wno-pragmas -Wall -Wextra -Wunknown-pragmas -Waddress -Warray-bounds -Wbad-function-cast -Wchar-subscripts -Wcomment -Wfloat-equal -Wformat-security -Wformat=2 -Wmissing-field-initializers -Wmissing-noreturn -Wmissing-prototypes -Wnested-externs -Woverride-init -Wpointer-arith -Wpointer-sign -Wshadow -Wshorten-64-to-32 -Wsign-compare -Wstrict-overflow=1 -Wswitch-enum -Wundef -Wunused -Wunused-result -Wunused-variable -Wwrite-strings -fwrapv Step #3 - "compile-libfuzzer-coverage-x86_64": * C++ Compiler: clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": * C++ Flags: -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": * CPP Flags: Step #3 - "compile-libfuzzer-coverage-x86_64": * CCAS Flags: -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": * LD Flags: Step #3 - "compile-libfuzzer-coverage-x86_64": * LIB Flags: -pie -z relro -z now -Werror Step #3 - "compile-libfuzzer-coverage-x86_64": * Library Suffix: Step #3 - "compile-libfuzzer-coverage-x86_64": * Debug enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Coverage enabled: Step #3 - "compile-libfuzzer-coverage-x86_64": * Warnings as failure: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * make -j: 33 Step #3 - "compile-libfuzzer-coverage-x86_64": * VCS checkout: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Features Step #3 - "compile-libfuzzer-coverage-x86_64": * Experimental settings: Forbidden Step #3 - "compile-libfuzzer-coverage-x86_64": * FIPS: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Single threaded: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Filesystem: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * OpenSSH Build: no Step #3 - "compile-libfuzzer-coverage-x86_64": * OpenSSL Extra API: no Step #3 - "compile-libfuzzer-coverage-x86_64": * OpenSSL Coexist: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Old Names: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Max Strength Build: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Distro Build: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Reproducible Build: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Side-channel Hardening: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Single Precision Math: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SP implementation: all Step #3 - "compile-libfuzzer-coverage-x86_64": * Fast Math: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Heap Math: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Assembly Allowed: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * sniffer: no Step #3 - "compile-libfuzzer-coverage-x86_64": * snifftest: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ARC4: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-NI: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-CBC: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-CBC length checks: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-GCM: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-GCM streaming: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-CCM: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-CTR: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-CFB: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-OFB: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-XTS: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-XTS streaming: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-SIV: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES-EAX: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES Bitspliced: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AES Key Wrap: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ARIA: no Step #3 - "compile-libfuzzer-coverage-x86_64": * DES3: no Step #3 - "compile-libfuzzer-coverage-x86_64": * DES3 TLS Suites: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Camellia: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CUDA: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SM4-ECB: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SM4-CBC: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SM4-CTR: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SM4-GCM: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SM4-CCM: no Step #3 - "compile-libfuzzer-coverage-x86_64": * NULL Cipher: no Step #3 - "compile-libfuzzer-coverage-x86_64": * MD2: no Step #3 - "compile-libfuzzer-coverage-x86_64": * MD4: no Step #3 - "compile-libfuzzer-coverage-x86_64": * MD5: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * RIPEMD: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SHA: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * SHA-224: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * SHA-384: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * SHA-512: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * SHA3: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * SHAKE128: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SHAKE256: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SM3: no Step #3 - "compile-libfuzzer-coverage-x86_64": * BLAKE2: no Step #3 - "compile-libfuzzer-coverage-x86_64": * BLAKE2S: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SipHash: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CMAC: no Step #3 - "compile-libfuzzer-coverage-x86_64": * keygen: no Step #3 - "compile-libfuzzer-coverage-x86_64": * acert: no Step #3 - "compile-libfuzzer-coverage-x86_64": * certgen: no Step #3 - "compile-libfuzzer-coverage-x86_64": * certreq: no Step #3 - "compile-libfuzzer-coverage-x86_64": * certext: no Step #3 - "compile-libfuzzer-coverage-x86_64": * certgencache: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CHACHA: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * XCHACHA: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Hash DRBG: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * MmemUse Entropy: Step #3 - "compile-libfuzzer-coverage-x86_64": * (AKA: wolfEntropy): no Step #3 - "compile-libfuzzer-coverage-x86_64": * PWDBASED: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Encrypted keys: no Step #3 - "compile-libfuzzer-coverage-x86_64": * scrypt: no Step #3 - "compile-libfuzzer-coverage-x86_64": * wolfCrypt Only: no Step #3 - "compile-libfuzzer-coverage-x86_64": * HKDF: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * HPKE: no Step #3 - "compile-libfuzzer-coverage-x86_64": * X9.63 KDF: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SRTP-KDF: no Step #3 - "compile-libfuzzer-coverage-x86_64": * PSK: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Poly1305: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * LEANPSK: no Step #3 - "compile-libfuzzer-coverage-x86_64": * LEANTLS: no Step #3 - "compile-libfuzzer-coverage-x86_64": * RSA: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * RSA-PSS: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * DSA: no Step #3 - "compile-libfuzzer-coverage-x86_64": * DH: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * DH Default Parameters: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * ECC: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * ECC Custom Curves: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ECC Minimum Bits: 224 Step #3 - "compile-libfuzzer-coverage-x86_64": * FPECC: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ECC_ENCRYPT: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Brainpool: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SM2: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CURVE25519: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ED25519: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ED25519 streaming: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CURVE448: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ED448: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ED448 streaming: no Step #3 - "compile-libfuzzer-coverage-x86_64": * LMS: no Step #3 - "compile-libfuzzer-coverage-x86_64": * LMS wolfSSL impl: no Step #3 - "compile-libfuzzer-coverage-x86_64": * XMSS: no Step #3 - "compile-libfuzzer-coverage-x86_64": * XMSS wolfSSL impl: no Step #3 - "compile-libfuzzer-coverage-x86_64": * KYBER: no Step #3 - "compile-libfuzzer-coverage-x86_64": * KYBER wolfSSL impl: no Step #3 - "compile-libfuzzer-coverage-x86_64": * DILITHIUM: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ECCSI no Step #3 - "compile-libfuzzer-coverage-x86_64": * SAKKE no Step #3 - "compile-libfuzzer-coverage-x86_64": * ASN: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Anonymous cipher: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CODING: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * MEMORY: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * I/O POOL: no Step #3 - "compile-libfuzzer-coverage-x86_64": * wolfSentry: no Step #3 - "compile-libfuzzer-coverage-x86_64": * LIGHTY: no Step #3 - "compile-libfuzzer-coverage-x86_64": * WPA Supplicant: no Step #3 - "compile-libfuzzer-coverage-x86_64": * HAPROXY: no Step #3 - "compile-libfuzzer-coverage-x86_64": * STUNNEL: no Step #3 - "compile-libfuzzer-coverage-x86_64": * tcpdump: no Step #3 - "compile-libfuzzer-coverage-x86_64": * libssh2: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ntp: no Step #3 - "compile-libfuzzer-coverage-x86_64": * rsyslog: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Apache httpd: no Step #3 - "compile-libfuzzer-coverage-x86_64": * NGINX: no Step #3 - "compile-libfuzzer-coverage-x86_64": * OpenResty: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ASIO: no Step #3 - "compile-libfuzzer-coverage-x86_64": * LIBWEBSOCKETS: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Qt: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Qt Unit Testing: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SIGNAL: no Step #3 - "compile-libfuzzer-coverage-x86_64": * chrony: no Step #3 - "compile-libfuzzer-coverage-x86_64": * strongSwan: no Step #3 - "compile-libfuzzer-coverage-x86_64": * OpenLDAP: no Step #3 - "compile-libfuzzer-coverage-x86_64": * hitch: no Step #3 - "compile-libfuzzer-coverage-x86_64": * memcached: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Mosquitto no Step #3 - "compile-libfuzzer-coverage-x86_64": * ERROR_STRINGS: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * DTLS: no Step #3 - "compile-libfuzzer-coverage-x86_64": * DTLS v1.3: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SCTP: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SRTP: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Indefinite Length: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Multicast: no Step #3 - "compile-libfuzzer-coverage-x86_64": * SSL v3.0 (Old): no Step #3 - "compile-libfuzzer-coverage-x86_64": * TLS v1.0 (Old): no Step #3 - "compile-libfuzzer-coverage-x86_64": * TLS v1.1 (Old): no Step #3 - "compile-libfuzzer-coverage-x86_64": * TLS v1.2: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * TLS v1.3: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * RPK: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Post-handshake Auth: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Early Data: no Step #3 - "compile-libfuzzer-coverage-x86_64": * QUIC: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Send State in HRR Cookie: undefined Step #3 - "compile-libfuzzer-coverage-x86_64": * OCSP: no Step #3 - "compile-libfuzzer-coverage-x86_64": * OCSP Stapling: no Step #3 - "compile-libfuzzer-coverage-x86_64": * OCSP Stapling v2: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CRL: no Step #3 - "compile-libfuzzer-coverage-x86_64": * CRL-MONITOR: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Persistent session cache: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Persistent cert cache: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Atomic User Record Layer: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Public Key Callbacks: no Step #3 - "compile-libfuzzer-coverage-x86_64": * libxmss: no Step #3 - "compile-libfuzzer-coverage-x86_64": * liblms: no Step #3 - "compile-libfuzzer-coverage-x86_64": * liboqs: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Whitewood netRandom: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Server Name Indication: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * ALPN: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Maximum Fragment Length: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Trusted CA Indication: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Truncated HMAC: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Supported Elliptic Curves: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * FFDHE only in client: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Session Ticket: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Extended Master Secret: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Renegotiation Indication: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Secure Renegotiation: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Fallback SCSV: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Keying Material Exporter: no Step #3 - "compile-libfuzzer-coverage-x86_64": * All TLS Extensions: no Step #3 - "compile-libfuzzer-coverage-x86_64": * S/MIME: no Step #3 - "compile-libfuzzer-coverage-x86_64": * PKCS#7: no Step #3 - "compile-libfuzzer-coverage-x86_64": * PKCS#8: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * PKCS#11: no Step #3 - "compile-libfuzzer-coverage-x86_64": * PKCS#12: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * wolfSSH: no Step #3 - "compile-libfuzzer-coverage-x86_64": * wolfEngine: no Step #3 - "compile-libfuzzer-coverage-x86_64": * wolfTPM: no Step #3 - "compile-libfuzzer-coverage-x86_64": * wolfCLU: no Step #3 - "compile-libfuzzer-coverage-x86_64": * wolfSCEP: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Secure Remote Password: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Small Stack: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Linux Kernel Module: no Step #3 - "compile-libfuzzer-coverage-x86_64": * valgrind unit tests: no Step #3 - "compile-libfuzzer-coverage-x86_64": * LIBZ: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Examples: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Crypt tests: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Stack sizes in tests: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Heap stats in tests: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Asynchronous Crypto: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Asynchronous Crypto (sim): no Step #3 - "compile-libfuzzer-coverage-x86_64": * Cavium Nitrox: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Cavium Octeon (Sync): no Step #3 - "compile-libfuzzer-coverage-x86_64": * Intel Quick Assist: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ARM ASM: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ARM ASM SHA512/SHA3 Crypto no Step #3 - "compile-libfuzzer-coverage-x86_64": * ARM ASM SM3/SM4 Crypto no Step #3 - "compile-libfuzzer-coverage-x86_64": * RISC-V ASM no Step #3 - "compile-libfuzzer-coverage-x86_64": * Write duplicate: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Xilinx Hardware Acc.: no Step #3 - "compile-libfuzzer-coverage-x86_64": * C89: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Inline Code: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Linux AF_ALG: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Linux KCAPI: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Linux devcrypto: no Step #3 - "compile-libfuzzer-coverage-x86_64": * PK callbacks: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Crypto callbacks: no Step #3 - "compile-libfuzzer-coverage-x86_64": * i.MX CAAM: no Step #3 - "compile-libfuzzer-coverage-x86_64": * IoT-Safe: no Step #3 - "compile-libfuzzer-coverage-x86_64": * IoT-Safe HWRNG: no Step #3 - "compile-libfuzzer-coverage-x86_64": * NXP SE050: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Maxim Integrated MAXQ10XX: no Step #3 - "compile-libfuzzer-coverage-x86_64": * PSA: no Step #3 - "compile-libfuzzer-coverage-x86_64": * System CA certs: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Dual alg cert support: no Step #3 - "compile-libfuzzer-coverage-x86_64": * ERR Queues per Thread: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * rwlock: no Step #3 - "compile-libfuzzer-coverage-x86_64": * keylog export: no Step #3 - "compile-libfuzzer-coverage-x86_64": * AutoSAR : no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": --- Step #3 - "compile-libfuzzer-coverage-x86_64": ./configure flags: '--enable-static' '--disable-crypttests' '--disable-examples' 'CC=clang' 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument' Step #3 - "compile-libfuzzer-coverage-x86_64": --- Step #3 - "compile-libfuzzer-coverage-x86_64": Note: Make sure your application includes "wolfssl/options.h" before any other wolfSSL headers. Step #3 - "compile-libfuzzer-coverage-x86_64": You can define "WOLFSSL_USE_OPTIONS_H" in your application to include this automatically. Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": make -j33 all-recursive Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: warning: -j33 forced in submake: resetting jobserver mode. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/wolfssl' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/wolfssl' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: warning: -j33 forced in submake: resetting jobserver mode. Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-hmac.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-hash.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-cpuid.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-kdf.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-random.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-sha256.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-rsa.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-sp_int.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-aes.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-sha.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-sha512.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-sha3.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-logging.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-wc_port.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-error.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-wc_encrypt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-signature.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-wolfmath.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-memory.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-dh.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-asn.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-coding.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-poly1305.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-md5.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-pwdbased.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-pkcs12.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-chacha.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-ecc.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfssl_la-internal.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfssl_la-wolfio.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC wolfcrypt/src/src_libwolfssl_la-chacha20_poly1305.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfssl_la-ssl.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfssl_la-keys.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfssl_la-tls.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfssl_la-tls13.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD src/libwolfssl.la Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/wolfssl' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/wolfssl' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ realpath . Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -I /src/wolfssl' Step #3 - "compile-libfuzzer-coverage-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -I /src/wolfssl' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ realpath src/.libs/ Step #3 - "compile-libfuzzer-coverage-x86_64": + export LDFLAGS=-L/src/wolfssl/src/.libs Step #3 - "compile-libfuzzer-coverage-x86_64": + LDFLAGS=-L/src/wolfssl/src/.libs Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/wolfmqtt/ Step #3 - "compile-libfuzzer-coverage-x86_64": + ./autogen.sh Step #3 - "compile-libfuzzer-coverage-x86_64": Making missing build-aux directory. Step #3 - "compile-libfuzzer-coverage-x86_64": Touching missing build-aux/config.rpath file. Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Entering directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: not using Gettext Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: aclocal --force -I m4 Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: tracing Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: libtoolize --copy --force Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'build-aux/ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoconf --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoheader --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: automake --add-missing --copy --force-missing Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:43: installing 'build-aux/compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:18: installing 'build-aux/config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:18: installing 'build-aux/config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:21: installing 'build-aux/install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:21: installing 'build-aux/missing' Step #3 - "compile-libfuzzer-coverage-x86_64": Makefile.am: installing 'build-aux/depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing 'build-aux/test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Leaving directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --enable-static --disable-examples --enable-mqtt5 Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking target system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether UID '0' is supported by ustar format... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether GID '0' is supported by ustar format... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to create a ustar tar archive... gnutar Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether -lc should be explicitly linked in... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the -Werror option is usable... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for simple visibility declarations... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... (cached) gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long long... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking arpa/inet.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for arpa/inet.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking fcntl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fcntl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking limits.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for limits.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netdb.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netdb.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netinet/in.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking netinet/in.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for netinet/in.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stddef.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking stddef.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stddef.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking time.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking time.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioctl.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/ioctl.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/ioctl.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/socket.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/socket.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/socket.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/time.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/time.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking errno.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking errno.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for errno.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/un.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/un.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/un.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gethostbyname... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getaddrinfo... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gettimeofday... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inet_ntoa... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memset... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for socket... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for signal... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for rand... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for socket in -lnetwork... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for wolfSSL... configure: prefix NONE Step #3 - "compile-libfuzzer-coverage-x86_64": checking for debug... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang is Clang... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether pthreads work with "-pthread" and "-lpthread"... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether Clang needs flag to prevent "argument unused" warning when linking with -pthread... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether more special flags are required for pthreads... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for PTHREAD_PRIO_INHERIT... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for wolfCrypt_Init in -lwolfssl... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vcs system... git Step #3 - "compile-libfuzzer-coverage-x86_64": checking for vcs checkout... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the linker accepts -Werror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the linker accepts -z relro -z now... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the linker accepts -pie... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Werror... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wno-pragmas... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wall... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wno-strict-aliasing... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wextra... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunknown-pragmas... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wthis-test-should-fail... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Waddress... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Warray-bounds... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wbad-function-cast... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wchar-subscripts... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wcomment... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wfloat-equal... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wformat-security... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wformat=2... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmaybe-uninitialized... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmissing-field-initializers... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmissing-noreturn... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wmissing-prototypes... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wnested-externs... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wnormalized=id... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Woverride-init... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wpointer-arith... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wpointer-sign... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wredundant-decls... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wshadow... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wshorten-64-to-32... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wsign-compare... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wstrict-overflow=1... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wstrict-prototypes... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wswitch-enum... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wundef... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunused... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunused-result... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wunused-variable... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -Wwrite-strings... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether C compiler accepts -fwrapv... yes Step #3 - "compile-libfuzzer-coverage-x86_64": creating wolfmqtt-config - generic 1.19.1 for -lwolfmqtt -lwolfssl Step #3 - "compile-libfuzzer-coverage-x86_64": checking the number of available CPUs... 32 Step #3 - "compile-libfuzzer-coverage-x86_64": configure: adding automake macro support Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating aminclude.am Step #3 - "compile-libfuzzer-coverage-x86_64": configure: added jobserver support to make for 33 jobs Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating wolfmqtt/version.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": --- Step #3 - "compile-libfuzzer-coverage-x86_64": Running make clean... Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": --- Step #3 - "compile-libfuzzer-coverage-x86_64": Generating user options header... Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -O1, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -fno-omit-frame-pointer, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -gline-tables-only, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-error=enum-constexpr-conversion, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-error=incompatible-function-pointer-types, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-error=int-conversion, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-error=deprecated-declarations, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-error=implicit-function-declaration, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-error=implicit-int, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-error=vla-cxx-extension, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -fprofile-instr-generate, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -fcoverage-mapping, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -pthread, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wl,--no-as-needed, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wl,-ldl, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wl,-lm, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-unused-command-line-argument, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -I, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is /src/wolfssl, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Werror, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-pragmas, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wall, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wno-strict-aliasing, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wextra, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wunknown-pragmas, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Waddress, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Warray-bounds, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wbad-function-cast, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wchar-subscripts, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wcomment, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wfloat-equal, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wformat-security, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wformat=2, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wmissing-field-initializers, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wmissing-noreturn, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wmissing-prototypes, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wnested-externs, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Woverride-init, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wpointer-arith, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wpointer-sign, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wredundant-decls, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wshadow, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wshorten-64-to-32, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wsign-compare, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wstrict-overflow=1, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wswitch-enum, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wundef, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wunused, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wunused-result, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wunused-variable, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -Wwrite-strings, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -fwrapv, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -fvisibility=hidden, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -I/usr/local/include, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -O2, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": not outputting (N)DEBUG to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": option w/o begin -D is -pthread, not saving to wolfmqtt/options.h Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": --- Step #3 - "compile-libfuzzer-coverage-x86_64": Configuration summary for wolfmqtt version 1.19.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": * Installation prefix: /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": * System type: pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": * Host CPU: x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": * C Compiler: clang Step #3 - "compile-libfuzzer-coverage-x86_64": * C Flags: -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -I /src/wolfssl -Werror -Wno-pragmas -Wall -Wno-strict-aliasing -Wextra -Wunknown-pragmas -Waddress -Warray-bounds -Wbad-function-cast -Wchar-subscripts -Wcomment -Wfloat-equal -Wformat-security -Wformat=2 -Wmissing-field-initializers -Wmissing-noreturn -Wmissing-prototypes -Wnested-externs -Woverride-init -Wpointer-arith -Wpointer-sign -Wredundant-decls -Wshadow -Wshorten-64-to-32 -Wsign-compare -Wstrict-overflow=1 -Wswitch-enum -Wundef -Wunused -Wunused-result -Wunused-variable -Wwrite-strings -fwrapv Step #3 - "compile-libfuzzer-coverage-x86_64": * CPP Flags: -fvisibility=hidden -I/usr/local/include Step #3 - "compile-libfuzzer-coverage-x86_64": * Linker Flags: -L/src/wolfssl/src/.libs -L/usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": * LIB Flags: -pie -z relro -z now -Werror Step #3 - "compile-libfuzzer-coverage-x86_64": * Disconnect Callback: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Error Strings: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Enable MQTT-SN: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Enable MQTT v5.0: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Property Callback: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * Examples: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Non-Blocking: no Step #3 - "compile-libfuzzer-coverage-x86_64": * STDIN Capture: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * TLS: yes Step #3 - "compile-libfuzzer-coverage-x86_64": * CURL: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Multi-thread: no Step #3 - "compile-libfuzzer-coverage-x86_64": * Stress: no Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": make -j33 all-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: warning: -j33 forced in submake: resetting jobserver mode. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/wolfmqtt' Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfmqtt_la-mqtt_client.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfmqtt_la-mqtt_packet.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC src/libwolfmqtt_la-mqtt_socket.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD src/libwolfmqtt.la Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/wolfmqtt' Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++17 -I /src/fuzzing-headers/include/ -I /src/wolfssl/ -I /src/wolfmqtt/ /src/wolfmqtt-fuzzers/fuzzer.cpp /src/wolfmqtt/src/.libs/libwolfmqtt.a /src/wolfssl/src/.libs/libwolfssl.a -fsanitize=fuzzer -o /workspace/out/libfuzzer-coverage-x86_64/wolfmqtt-fuzzer Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 5fc1849ea29a: Already exists Step #4: 5bca3ba2fc7d: Already exists Step #4: fae44f6c4afb: Pulling fs layer Step #4: 6bb086a76dac: Pulling fs layer Step #4: 93d27c16d33e: Pulling fs layer Step #4: 2ed907c114e3: Pulling fs layer Step #4: c356b7427c88: Pulling fs layer Step #4: e8d856c3fdca: Pulling fs layer Step #4: 3931eca29f39: Pulling fs layer Step #4: b76e3f62a0ba: Pulling fs layer Step #4: 7bfd5336ece5: Pulling fs layer Step #4: e0b08c0fdc11: Pulling fs layer Step #4: 2846796a4416: Pulling fs layer Step #4: 6cc7e05a106e: Pulling fs layer Step #4: 6c44541c6a30: Pulling fs layer Step #4: 110ea339d19c: Pulling fs layer Step #4: 080996c25b34: Pulling fs layer Step #4: 4c9dcebec043: Pulling fs layer Step #4: 5e63b9addfd0: Pulling fs layer Step #4: 7606710857f8: Pulling fs layer Step #4: 47b62b419d91: Pulling fs layer Step #4: be88441f6a95: Pulling fs layer Step #4: 6e1d3dc39f27: Pulling fs layer Step #4: 8fd9caca2676: Pulling fs layer Step #4: 10ceb6aa6ab4: Pulling fs layer Step #4: 4c9dcebec043: Waiting Step #4: 110ea339d19c: Waiting Step #4: 6cc7e05a106e: Waiting Step #4: 5e63b9addfd0: Waiting Step #4: 080996c25b34: Waiting Step #4: 6e1d3dc39f27: Waiting Step #4: 6c44541c6a30: Waiting Step #4: 10ceb6aa6ab4: Waiting Step #4: 8fd9caca2676: Waiting Step #4: 7606710857f8: Waiting Step #4: be88441f6a95: Waiting Step #4: 47b62b419d91: Waiting Step #4: 3931eca29f39: Waiting Step #4: 2ed907c114e3: Waiting Step #4: e8d856c3fdca: Waiting Step #4: c356b7427c88: Waiting Step #4: b76e3f62a0ba: Waiting Step #4: 7bfd5336ece5: Waiting Step #4: e0b08c0fdc11: Waiting Step #4: 93d27c16d33e: Verifying Checksum Step #4: 93d27c16d33e: Download complete Step #4: fae44f6c4afb: Download complete Step #4: 6bb086a76dac: Verifying Checksum Step #4: 6bb086a76dac: Download complete Step #4: fae44f6c4afb: Pull complete Step #4: c356b7427c88: Verifying Checksum Step #4: c356b7427c88: Download complete Step #4: 2ed907c114e3: Verifying Checksum Step #4: 2ed907c114e3: Download complete Step #4: 3931eca29f39: Verifying Checksum Step #4: 3931eca29f39: Download complete Step #4: b76e3f62a0ba: Verifying Checksum Step #4: b76e3f62a0ba: Download complete Step #4: 6bb086a76dac: Pull complete Step #4: 93d27c16d33e: Pull complete Step #4: 7bfd5336ece5: Verifying Checksum Step #4: 7bfd5336ece5: Download complete Step #4: e8d856c3fdca: Verifying Checksum Step #4: e8d856c3fdca: Download complete Step #4: 2ed907c114e3: Pull complete Step #4: 2846796a4416: Verifying Checksum Step #4: 2846796a4416: Download complete Step #4: 6cc7e05a106e: Verifying Checksum Step #4: 6cc7e05a106e: Download complete Step #4: c356b7427c88: Pull complete Step #4: 6c44541c6a30: Download complete Step #4: 080996c25b34: Verifying Checksum Step #4: 080996c25b34: Download complete Step #4: e0b08c0fdc11: Verifying Checksum Step #4: e0b08c0fdc11: Download complete Step #4: 110ea339d19c: Verifying Checksum Step #4: 110ea339d19c: Download complete Step #4: 5e63b9addfd0: Verifying Checksum Step #4: 5e63b9addfd0: Download complete Step #4: 7606710857f8: Verifying Checksum Step #4: 7606710857f8: Download complete Step #4: e8d856c3fdca: Pull complete Step #4: 47b62b419d91: Verifying Checksum Step #4: 47b62b419d91: Download complete Step #4: 3931eca29f39: Pull complete Step #4: b76e3f62a0ba: Pull complete Step #4: 7bfd5336ece5: Pull complete Step #4: 4c9dcebec043: Verifying Checksum Step #4: 4c9dcebec043: Download complete Step #4: 6e1d3dc39f27: Verifying Checksum Step #4: 6e1d3dc39f27: Download complete Step #4: 10ceb6aa6ab4: Verifying Checksum Step #4: 10ceb6aa6ab4: Download complete Step #4: 8fd9caca2676: Download complete Step #4: be88441f6a95: Verifying Checksum Step #4: be88441f6a95: Download complete Step #4: e0b08c0fdc11: Pull complete Step #4: 2846796a4416: Pull complete Step #4: 6cc7e05a106e: Pull complete Step #4: 6c44541c6a30: Pull complete Step #4: 110ea339d19c: Pull complete Step #4: 080996c25b34: Pull complete Step #4: 4c9dcebec043: Pull complete Step #4: 5e63b9addfd0: Pull complete Step #4: 7606710857f8: Pull complete Step #4: 47b62b419d91: Pull complete Step #4: be88441f6a95: Pull complete Step #4: 6e1d3dc39f27: Pull complete Step #4: 8fd9caca2676: Pull complete Step #4: 10ceb6aa6ab4: Pull complete Step #4: Digest: sha256:dc299f69dfed0a7c14bd3c39c65c153824e6f98156f34438d47c59f39aa939bf Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/wolfmqtt-fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/wolfmqtt-fuzzer.zip or Step #5: /corpus/wolfmqtt-fuzzer.zip.zip, and cannot find /corpus/wolfmqtt-fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for wolfmqtt-fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image wolfmqtt Step #5: python infra/helper.py build_fuzzers --sanitizer coverage wolfmqtt Step #5: python infra/helper.py coverage wolfmqtt Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1