starting build "48392366-d414-4edf-ac67-d2daf0f31104" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 5fc1849ea29a: Pulling fs layer Step #1: 5bca3ba2fc7d: Pulling fs layer Step #1: c3f8f264f82b: Pulling fs layer Step #1: 4beb7a10c8f4: Pulling fs layer Step #1: 0ca13ee436c2: Pulling fs layer Step #1: d11b53fc85fe: Pulling fs layer Step #1: 1cbdd3829a23: Pulling fs layer Step #1: 7f7781280c06: Pulling fs layer Step #1: 846994f6541d: Pulling fs layer Step #1: 83087fdbd323: Pulling fs layer Step #1: 5e20af423505: Pulling fs layer Step #1: 7e2d2d2efe99: Pulling fs layer Step #1: bae98e0cfe62: Pulling fs layer Step #1: 7c94181fc29a: Pulling fs layer Step #1: 4018e9ce42a6: Pulling fs layer Step #1: bf9219ec845b: Pulling fs layer Step #1: 71174894d930: Pulling fs layer Step #1: e04ddd5d972b: Pulling fs layer Step #1: bfb7b1a6728d: Pulling fs layer Step #1: 2e1d8e23a9a8: Pulling fs layer Step #1: 153eacb0a891: Pulling fs layer Step #1: 4d7aa988bb31: Pulling fs layer Step #1: f93820478c87: Pulling fs layer Step #1: 038020a237ce: Pulling fs layer Step #1: 4beb7a10c8f4: Waiting Step #1: 416ea49f7c22: Pulling fs layer Step #1: 846994f6541d: Waiting Step #1: 9cdc40c52e67: Pulling fs layer Step #1: 0ca13ee436c2: Waiting Step #1: bee113eb3842: Pulling fs layer Step #1: 83087fdbd323: Waiting Step #1: 93286fa4d809: Pulling fs layer Step #1: d11b53fc85fe: Waiting Step #1: 88a7cbc5ce33: Pulling fs layer Step #1: 5bdd6bc53e7b: Pulling fs layer Step #1: d84cd2be715d: Pulling fs layer Step #1: 1cbdd3829a23: Waiting Step #1: d171e73dd44a: Pulling fs layer Step #1: 7c94181fc29a: Waiting Step #1: 7f7781280c06: Waiting Step #1: 9972794eff61: Pulling fs layer Step #1: 4018e9ce42a6: Waiting Step #1: 5e20af423505: Waiting Step #1: 416ea49f7c22: Waiting Step #1: 71174894d930: Waiting Step #1: 7e2d2d2efe99: Waiting Step #1: e04ddd5d972b: Waiting Step #1: bae98e0cfe62: Waiting Step #1: 9cdc40c52e67: Waiting Step #1: 5bdd6bc53e7b: Waiting Step #1: bfb7b1a6728d: Waiting Step #1: bee113eb3842: Waiting Step #1: d84cd2be715d: Waiting Step #1: d171e73dd44a: Waiting Step #1: 2e1d8e23a9a8: Waiting Step #1: 88a7cbc5ce33: Waiting Step #1: 93286fa4d809: Waiting Step #1: 9972794eff61: Waiting Step #1: 153eacb0a891: Waiting Step #1: f93820478c87: Waiting Step #1: c3f8f264f82b: Waiting Step #1: 4d7aa988bb31: Waiting Step #1: 038020a237ce: Waiting Step #1: 5bca3ba2fc7d: Verifying Checksum Step #1: 5bca3ba2fc7d: Download complete Step #1: b549f31133a9: Download complete Step #1: 4beb7a10c8f4: Verifying Checksum Step #1: 4beb7a10c8f4: Download complete Step #1: c3f8f264f82b: Verifying Checksum Step #1: c3f8f264f82b: Download complete Step #1: 0ca13ee436c2: Verifying Checksum Step #1: 0ca13ee436c2: Download complete Step #1: 1cbdd3829a23: Verifying Checksum Step #1: 1cbdd3829a23: Download complete Step #1: 7f7781280c06: Download complete Step #1: 5fc1849ea29a: Verifying Checksum Step #1: 5fc1849ea29a: Download complete Step #1: b549f31133a9: Pull complete Step #1: 83087fdbd323: Verifying Checksum Step #1: 83087fdbd323: Download complete Step #1: 5e20af423505: Verifying Checksum Step #1: 5e20af423505: Download complete Step #1: 7e2d2d2efe99: Verifying Checksum Step #1: 7e2d2d2efe99: Download complete Step #1: bae98e0cfe62: Verifying Checksum Step #1: bae98e0cfe62: Download complete Step #1: 7c94181fc29a: Verifying Checksum Step #1: 7c94181fc29a: Download complete Step #1: 4018e9ce42a6: Download complete Step #1: 846994f6541d: Verifying Checksum Step #1: 846994f6541d: Download complete Step #1: bf9219ec845b: Verifying Checksum Step #1: bf9219ec845b: Download complete Step #1: 71174894d930: Verifying Checksum Step #1: 71174894d930: Download complete Step #1: e04ddd5d972b: Download complete Step #1: bfb7b1a6728d: Verifying Checksum Step #1: bfb7b1a6728d: Download complete Step #1: 2e1d8e23a9a8: Verifying Checksum Step #1: 2e1d8e23a9a8: Download complete Step #1: d11b53fc85fe: Verifying Checksum Step #1: d11b53fc85fe: Download complete Step #1: 153eacb0a891: Download complete Step #1: f93820478c87: Verifying Checksum Step #1: f93820478c87: Download complete Step #1: 038020a237ce: Verifying Checksum Step #1: 038020a237ce: Download complete Step #1: 4d7aa988bb31: Verifying Checksum Step #1: 4d7aa988bb31: Download complete Step #1: 416ea49f7c22: Download complete Step #1: bee113eb3842: Verifying Checksum Step #1: bee113eb3842: Download complete Step #1: 9cdc40c52e67: Verifying Checksum Step #1: 9cdc40c52e67: Download complete Step #1: 93286fa4d809: Verifying Checksum Step #1: 93286fa4d809: Download complete Step #1: 5bdd6bc53e7b: Download complete Step #1: 88a7cbc5ce33: Verifying Checksum Step #1: 88a7cbc5ce33: Download complete Step #1: d84cd2be715d: Verifying Checksum Step #1: d84cd2be715d: Download complete Step #1: d171e73dd44a: Verifying Checksum Step #1: d171e73dd44a: Download complete Step #1: 5fc1849ea29a: Pull complete Step #1: 9972794eff61: Verifying Checksum Step #1: 9972794eff61: Download complete Step #1: 5bca3ba2fc7d: Pull complete Step #1: c3f8f264f82b: Pull complete Step #1: 4beb7a10c8f4: Pull complete Step #1: 0ca13ee436c2: Pull complete Step #1: d11b53fc85fe: Pull complete Step #1: 1cbdd3829a23: Pull complete Step #1: 7f7781280c06: Pull complete Step #1: 846994f6541d: Pull complete Step #1: 83087fdbd323: Pull complete Step #1: 5e20af423505: Pull complete Step #1: 7e2d2d2efe99: Pull complete Step #1: bae98e0cfe62: Pull complete Step #1: 7c94181fc29a: Pull complete Step #1: 4018e9ce42a6: Pull complete Step #1: bf9219ec845b: Pull complete Step #1: 71174894d930: Pull complete Step #1: e04ddd5d972b: Pull complete Step #1: bfb7b1a6728d: Pull complete Step #1: 2e1d8e23a9a8: Pull complete Step #1: 153eacb0a891: Pull complete Step #1: 4d7aa988bb31: Pull complete Step #1: f93820478c87: Pull complete Step #1: 038020a237ce: Pull complete Step #1: 416ea49f7c22: Pull complete Step #1: 9cdc40c52e67: Pull complete Step #1: bee113eb3842: Pull complete Step #1: 93286fa4d809: Pull complete Step #1: 88a7cbc5ce33: Pull complete Step #1: 5bdd6bc53e7b: Pull complete Step #1: d84cd2be715d: Pull complete Step #1: d171e73dd44a: Pull complete Step #1: 9972794eff61: Pull complete Step #1: Digest: sha256:a2f870afb8e148c5cfc32450b790335c008e4a0c77e210bbb8adf0c60caae5c6 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> dd198c39e8a6 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y make autoconf automake libtool libstdc++-9-dev libssl-dev libseccomp-dev pkg-config Step #1: ---> Running in 05cbd477f6c1 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (380 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: libssl-dev is already the newest version (1.1.1f-1ubuntu2.23). Step #1: libstdc++-9-dev is already the newest version (9.4.0-1ubuntu1~20.04.2). Step #1: libstdc++-9-dev set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev file libglib2.0-0 libglib2.0-data libicu66 libltdl-dev Step #1: libltdl7 libmagic-mgc libmagic1 libsigsegv2 libxml2 m4 shared-mime-info Step #1: xdg-user-dirs Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext libtool-doc seccomp Step #1: gfortran | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev file libglib2.0-0 libglib2.0-data libicu66 Step #1: libltdl-dev libltdl7 libmagic-mgc libmagic1 libseccomp-dev libsigsegv2 Step #1: libtool libxml2 m4 pkg-config shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 19 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 12.8 MB of archives. Step #1: After this operation, 56.4 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.8 [1289 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.8 [5848 B] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 12.8 MB in 2s (7592 kB/s) Step #1: Selecting previously unselected package libmagic-mgc. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../03-libglib2.0-0_2.64.6-1~ubuntu20.04.8_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../04-libglib2.0-data_2.64.6-1~ubuntu20.04.8_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../05-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../06-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../07-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../08-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../09-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../10-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../11-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../12-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../13-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../14-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../15-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libseccomp-dev:amd64. Step #1: Preparing to unpack .../16-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../17-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../18-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 05cbd477f6c1 Step #1: ---> 0f1789421f86 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/stefanberger/libtpms libtpms Step #1: ---> Running in a9fc263cf330 Step #1: Cloning into 'libtpms'... Step #1: Removing intermediate container a9fc263cf330 Step #1: ---> ccca7341efad Step #1: Step 4/5 : WORKDIR libtpms Step #1: ---> Running in bc1ab25ca178 Step #1: Removing intermediate container bc1ab25ca178 Step #1: ---> 9181e999d994 Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> b246392ff457 Step #1: Successfully built b246392ff457 Step #1: Successfully tagged gcr.io/oss-fuzz/libtpms:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/libtpms Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filej8DE6P Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libtpms/.git Step #2 - "srcmap": + GIT_DIR=/src/libtpms Step #2 - "srcmap": + cd /src/libtpms Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/stefanberger/libtpms Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=ecb769cdb8ddbef6e3d91c062d9d2105acff5802 Step #2 - "srcmap": + jq_inplace /tmp/filej8DE6P '."/src/libtpms" = { type: "git", url: "https://github.com/stefanberger/libtpms", rev: "ecb769cdb8ddbef6e3d91c062d9d2105acff5802" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileD9EODb Step #2 - "srcmap": + cat /tmp/filej8DE6P Step #2 - "srcmap": + jq '."/src/libtpms" = { type: "git", url: "https://github.com/stefanberger/libtpms", rev: "ecb769cdb8ddbef6e3d91c062d9d2105acff5802" }' Step #2 - "srcmap": + mv /tmp/fileD9EODb /tmp/filej8DE6P Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filej8DE6P Step #2 - "srcmap": + rm /tmp/filej8DE6P Step #2 - "srcmap": { Step #2 - "srcmap": "/src/libtpms": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/stefanberger/libtpms", Step #2 - "srcmap": "rev": "ecb769cdb8ddbef6e3d91c062d9d2105acff5802" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + tests/oss-fuzz.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + export CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": + CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": + export CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": + CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": + export WORK=/work Step #3 - "compile-libfuzzer-coverage-x86_64": + WORK=/work Step #3 - "compile-libfuzzer-coverage-x86_64": + export OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": + OUT=/workspace/out/libfuzzer-coverage-x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fno-sanitize=bounds' Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir -p /workspace/out/libfuzzer-coverage-x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": + build=/work/build Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /work/build Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir -p /work/build Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd Step #3 - "compile-libfuzzer-coverage-x86_64": + export LIBTPMS=/src/libtpms Step #3 - "compile-libfuzzer-coverage-x86_64": + LIBTPMS=/src/libtpms Step #3 - "compile-libfuzzer-coverage-x86_64": + autoreconf -vfi Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Entering directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: not using Gettext Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: aclocal --force -I m4 Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: configure.ac: tracing Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: libtoolize --copy --force Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, '.'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file './ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoconf --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: /usr/bin/autoheader --force Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: running: automake --add-missing --copy --force-missing Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:57: installing './compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:13: installing './config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:13: installing './config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:14: installing './install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:14: installing './missing' Step #3 - "compile-libfuzzer-coverage-x86_64": src/Makefile.am: installing './depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing './test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": autoreconf: Leaving directory `.' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /work/build Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/libtpms/configure --disable-shared --enable-static --with-openssl --with-tpm2 Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking target system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for debug-enabled build... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the linker accepts -Wl,--version-script=/src/libtpms/src/test.syms... yes Step #3 - "compile-libfuzzer-coverage-x86_64": Building with TPM2 support Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for AES_set_encrypt_key in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking openssl/aes.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking openssl/aes.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for openssl/aes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": Building with openssl crypto library Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_CIPHER_CTX_new in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_EncryptInit_ex in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_aes_128_cbc in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_des_ede3_cbc in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_camellia_128_cbc in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for DES_random_key in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_CIPHER_CTX_iv in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EC_KEY_set_group in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EC_KEY_generate_key in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EC_KEY_get0_private_key in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ECDSA_SIG_new in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ECDSA_SIG_set0 in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ECDSA_do_verify in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ECDSA_do_sign in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EC_KEY_set_group in -lcrypto... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for RSA_set0_key in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for RSA_set0_factors in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for RSA_set0_crt_params in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for RSA_generate_key_ex in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_CTX_new in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_assign in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_encrypt_init in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_encrypt in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_decrypt_init in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_decrypt in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_sign_init in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_sign in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_verify_init in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_PKEY_verify in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EVP_get_digestbyname in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether EVP_PKEY_CTX_set0_rsa_oaep_label is defined in ... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether EVP_PKEY_CTX_set_rsa_padding is defined in ... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether EVP_PKEY_CTX_set_rsa_oaep_md is defined in ... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether EVP_PKEY_CTX_set_signature_md is defined in ... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether OSSL_KDF_NAME_SSKDF is defined in ... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for EC_POINT_get_affine_coordinates in -lcrypto... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... (cached) gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang++... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang++... /usr/bin/ld -m elf_x86_64 Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld -m elf_x86_64) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang++ option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang++ supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang++ linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... (cached) GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking for an ANSI C-conforming const... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inline... inline Step #3 - "compile-libfuzzer-coverage-x86_64": checking for size_t... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clock_gettime in -lc... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether linker supports -Wl,-z,relro... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether linker supports -Wl,-z,now... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating dist/libtpms.spec Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/libtpms/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/libtpms/tpm_library.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating man/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating man/man3/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libtpms.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tests/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": AM_CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fno-sanitize=bounds -DUSE_OPENSSL_FUNCTIONS_SYMMETRIC=1 -DUSE_OPENSSL_FUNCTIONS_EC=1 -DUSE_OPENSSL_FUNCTIONS_ECDSA=1 -DUSE_OPENSSL_FUNCTIONS_RSA=1 -DUSE_OPENSSL_FUNCTIONS_SSKDF=0 -DUSE_EC_POINT_GET_AFFINE_COORDINATES_API=1 -Wall -Werror -Wshadow -Wreturn-type -Wsign-compare -Wno-self-assign -Wmissing-prototypes Step #3 - "compile-libfuzzer-coverage-x86_64": HARDENING_CFLAGS=-fstack-protector-strong Step #3 - "compile-libfuzzer-coverage-x86_64": HARDENING_LDFLAGS= -Wl,-z,relro -Wl,-z,now Step #3 - "compile-libfuzzer-coverage-x86_64": AM_LDFLAGS= Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Version to build : 0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": Crypto library : openssl Step #3 - "compile-libfuzzer-coverage-x86_64": Debug build : no Step #3 - "compile-libfuzzer-coverage-x86_64": With TPM1.2 support : yes Step #3 - "compile-libfuzzer-coverage-x86_64": With TPM2 support : yes Step #3 - "compile-libfuzzer-coverage-x86_64": HAVE_VERSION_SCRIPT : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Use openssl crypto for : symmetric (AES, TDES) general elliptic curve (EC) elliptic curve (ECDSA) RSA Step #3 - "compile-libfuzzer-coverage-x86_64": Test coverage : no Step #3 - "compile-libfuzzer-coverage-x86_64": Static build : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Statically linked tests : yes Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": make all-recursive Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/work/build' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in include Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/work/build/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in libtpms Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/work/build/include/libtpms' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/work/build/include/libtpms' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/work/build/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/work/build/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/work/build/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in man Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/work/build/man' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in man3 Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/work/build/man/man3' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/work/build/man/man3' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/work/build/man' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/work/build/man' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/work/build/man' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/work/build/src' Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_la-disabled_interface.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_la-tpm_debug.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_la-tpm_library.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_la-tpm_memory.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_la-tpm_nvfile.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_tpm12_la-tpm_tpm12_interface.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_tpm12_la-tpm_tpm12_tis.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_tpm2_la-tpm_tpm2_interface.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC libtpms_tpm2_la-tpm_tpm2_tis.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_admin.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_audit.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_auth.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_cryptoh.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_daa.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_counter.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_digest.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_delegate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_global.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_error.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_identity.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_init.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_libtpms_io.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_key.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_load.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_maint.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_migration.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_nonce.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_openssl_helpers.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_nvram.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_pcr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_permanent.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_owner.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_platform.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_process.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_secret.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_session.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_sizedbuffer.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_startup.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_store.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_storage.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_ticks.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_time.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_transport.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_ver.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_svnrevision.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm12/libtpms_tpm12_la-tpm_crypto.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ACT_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ACTCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-AlgorithmCap.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-AlgorithmTests.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-AsymmetricCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-AttestationCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-AuditCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Attest_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Bits.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-BnEccConstants.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-BnConvert.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-BnMath.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-BnMemory.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Cancel.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-CapabilityCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Clock.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ClockCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-CommandAudit.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-CommandCodeAttributes.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-CommandDispatcher.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ContextCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Context_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-CryptEccData.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-CryptSelfTest.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-CryptUtil.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-DA.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-DebugHelpers.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-DictionaryCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-DuplicationCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-EACommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-EncryptDecrypt_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Entity.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Entropy.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-EphemeralCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ExecCommand.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ExtraData.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Global.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Handle.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-HashCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Hierarchy.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-HierarchyCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-IntegrityCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-IoBuffers.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Locality.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-LocalityPlat.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ManagementCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Manufacture.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Marshal.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-MathOnByteBuffers.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Memory.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-NVCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-NVDynamic.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-NVMem.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-NVReserved.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-NV_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Object.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ObjectCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Object_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PCR.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PlatformACT.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PlatformData.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PlatformPCR.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Policy_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Power.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PowerPlat.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PP.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PPPlat.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PrimeData.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-PropertyCap.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-RandomCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Response.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-ResponseCodeProcessing.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-RunCommand.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Session.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-SessionCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-SessionProcess.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-SigningCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-StartupCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-SymmetricCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TestingCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Ticket.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Time.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmAsn1.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmBigNumThunks.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmEcc_Signature_ECDAA.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmEcc_Signature_ECDSA.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmEcc_Signature_Schnorr.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmEcc_Signature_SM2.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmEcc_Signature_Util.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmEcc_Util.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmMath_Debug.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmMath_Util.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmSizeChecks.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TPMCmdp.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-TpmFail.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Unique.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Unmarshal.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-VendorInfo.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Vendor_TCG_Test.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-X509_ECC.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-X509_RSA.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-X509_spt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-BackwardsCompatibilityBitArray.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-BackwardsCompatibilityObject.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-LibtpmsCallbacks.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-NVMarshal.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-RuntimeAlgorithm.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-RuntimeAttributes.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-RuntimeCommands.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-RuntimeProfile.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-StateMarshal.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/libtpms_tpm2_la-Volatile.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-BnToOsslMath.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptCmac.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptDes.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptEccCrypt.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptEccKeyExchange.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptEccMain.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptEccSignature.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptHash.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptPrime.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptPrimeSieve.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptRand.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptRsa.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptSmac.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-CryptSym.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-ExpDCache.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-Helpers.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-TpmToOsslDesSupport.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC tpm2/crypto/openssl/libtpms_tpm2_la-TpmToOsslSupport.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libtpms_tpm12.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libtpms_tpm2.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libtpms.la Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/work/build/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in tests Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/work/build/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/work/build/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/work/build' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/work/build' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/work/build' Step #3 - "compile-libfuzzer-coverage-x86_64": + make -C tests fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": make: Entering directory '/work/build/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": CXX fuzz-fuzz.o Step #3 - "compile-libfuzzer-coverage-x86_64": CXXLD fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": make: Leaving directory '/work/build/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -jqr /workspace/out/libfuzzer-coverage-x86_64/fuzz_seed_corpus.zip /src/libtpms/tests/corpus-execute-command Step #3 - "compile-libfuzzer-coverage-x86_64": + find /work/build -type f -executable -name 'fuzz*' -exec mv '{}' /workspace/out/libfuzzer-coverage-x86_64 ';' Step #3 - "compile-libfuzzer-coverage-x86_64": + find /work/build -type f -name '*.options' -exec mv '{}' /workspace/out/libfuzzer-coverage-x86_64 ';' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 5fc1849ea29a: Already exists Step #4: 5bca3ba2fc7d: Already exists Step #4: fae44f6c4afb: Pulling fs layer Step #4: 6bb086a76dac: Pulling fs layer Step #4: 93d27c16d33e: Pulling fs layer Step #4: 2ed907c114e3: Pulling fs layer Step #4: c356b7427c88: Pulling fs layer Step #4: e8d856c3fdca: Pulling fs layer Step #4: 3931eca29f39: Pulling fs layer Step #4: b76e3f62a0ba: Pulling fs layer Step #4: 7bfd5336ece5: Pulling fs layer Step #4: e0b08c0fdc11: Pulling fs layer Step #4: 2846796a4416: Pulling fs layer Step #4: 6cc7e05a106e: Pulling fs layer Step #4: 6c44541c6a30: Pulling fs layer Step #4: 110ea339d19c: Pulling fs layer Step #4: 080996c25b34: Pulling fs layer Step #4: 4c9dcebec043: Pulling fs layer Step #4: 5e63b9addfd0: Pulling fs layer Step #4: 7606710857f8: Pulling fs layer Step #4: 47b62b419d91: Pulling fs layer Step #4: be88441f6a95: Pulling fs layer Step #4: 6e1d3dc39f27: Pulling fs layer Step #4: 8fd9caca2676: Pulling fs layer Step #4: 3931eca29f39: Waiting Step #4: 10ceb6aa6ab4: Pulling fs layer Step #4: b76e3f62a0ba: Waiting Step #4: 7bfd5336ece5: Waiting Step #4: e0b08c0fdc11: Waiting Step #4: 2846796a4416: Waiting Step #4: 6cc7e05a106e: Waiting Step #4: 6c44541c6a30: Waiting Step #4: 8fd9caca2676: Waiting Step #4: 10ceb6aa6ab4: Waiting Step #4: 110ea339d19c: Waiting Step #4: 47b62b419d91: Waiting Step #4: 080996c25b34: Waiting Step #4: 4c9dcebec043: Waiting Step #4: 5e63b9addfd0: Waiting Step #4: 7606710857f8: Waiting Step #4: be88441f6a95: Waiting Step #4: 6e1d3dc39f27: Waiting Step #4: c356b7427c88: Waiting Step #4: e8d856c3fdca: Waiting Step #4: 2ed907c114e3: Waiting Step #4: 93d27c16d33e: Download complete Step #4: fae44f6c4afb: Download complete Step #4: c356b7427c88: Verifying Checksum Step #4: c356b7427c88: Download complete Step #4: 6bb086a76dac: Verifying Checksum Step #4: 6bb086a76dac: Download complete Step #4: fae44f6c4afb: Pull complete Step #4: 2ed907c114e3: Verifying Checksum Step #4: 2ed907c114e3: Download complete Step #4: 3931eca29f39: Verifying Checksum Step #4: 3931eca29f39: Download complete Step #4: b76e3f62a0ba: Download complete Step #4: 6bb086a76dac: Pull complete Step #4: 7bfd5336ece5: Verifying Checksum Step #4: 7bfd5336ece5: Download complete Step #4: 93d27c16d33e: Pull complete Step #4: e8d856c3fdca: Verifying Checksum Step #4: e8d856c3fdca: Download complete Step #4: 2846796a4416: Verifying Checksum Step #4: 2846796a4416: Download complete Step #4: 2ed907c114e3: Pull complete Step #4: 6cc7e05a106e: Verifying Checksum Step #4: 6cc7e05a106e: Download complete Step #4: c356b7427c88: Pull complete Step #4: 6c44541c6a30: Verifying Checksum Step #4: 6c44541c6a30: Download complete Step #4: 080996c25b34: Verifying Checksum Step #4: 080996c25b34: Download complete Step #4: 110ea339d19c: Verifying Checksum Step #4: 110ea339d19c: Download complete Step #4: e0b08c0fdc11: Verifying Checksum Step #4: e0b08c0fdc11: Download complete Step #4: 5e63b9addfd0: Verifying Checksum Step #4: 5e63b9addfd0: Download complete Step #4: 7606710857f8: Verifying Checksum Step #4: 7606710857f8: Download complete Step #4: 47b62b419d91: Verifying Checksum Step #4: 47b62b419d91: Download complete Step #4: e8d856c3fdca: Pull complete Step #4: be88441f6a95: Verifying Checksum Step #4: be88441f6a95: Download complete Step #4: 3931eca29f39: Pull complete Step #4: b76e3f62a0ba: Pull complete Step #4: 8fd9caca2676: Verifying Checksum Step #4: 8fd9caca2676: Download complete Step #4: 4c9dcebec043: Verifying Checksum Step #4: 4c9dcebec043: Download complete Step #4: 7bfd5336ece5: Pull complete Step #4: 10ceb6aa6ab4: Verifying Checksum Step #4: 10ceb6aa6ab4: Download complete Step #4: 6e1d3dc39f27: Verifying Checksum Step #4: 6e1d3dc39f27: Download complete Step #4: e0b08c0fdc11: Pull complete Step #4: 2846796a4416: Pull complete Step #4: 6cc7e05a106e: Pull complete Step #4: 6c44541c6a30: Pull complete Step #4: 110ea339d19c: Pull complete Step #4: 080996c25b34: Pull complete Step #4: 4c9dcebec043: Pull complete Step #4: 5e63b9addfd0: Pull complete Step #4: 7606710857f8: Pull complete Step #4: 47b62b419d91: Pull complete Step #4: be88441f6a95: Pull complete Step #4: 6e1d3dc39f27: Pull complete Step #4: 8fd9caca2676: Pull complete Step #4: 10ceb6aa6ab4: Pull complete Step #4: Digest: sha256:dc299f69dfed0a7c14bd3c39c65c153824e6f98156f34438d47c59f39aa939bf Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz.zip or Step #5: /corpus/fuzz.zip.zip, and cannot find /corpus/fuzz.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image libtpms Step #5: python infra/helper.py build_fuzzers --sanitizer coverage libtpms Step #5: python infra/helper.py coverage libtpms Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1